11 IT Terms and Definitions You Need to Know

All of us are using the Internet these days, whether it’s to manage our businesses, reach out to prospective clients, send email, or “visit” our family and friends on social media. And so many times, we end up scratching our heads because we don’t speak information technology (or IT). Here are some terms and definitions that we all need to know to ensure that our computers are secure. These terms and definitions are also on the “need to know” list when we are talking to our IT Managers.

1. Virus – a piece of software that spreads itself from computer to computer, trying to infect them, where “infecting” simply means running the virus software. The intent can be malicious by destroying the computer, or more sinister to steal passwords or credit card information.


2. Ransomware– software that is similar to a virus, but the goal of ransomware software is to completely lock up the computer so that only the attacker who controls the ransomware can unlock the computer. Ransomware will tell you a way to contact the attacker to pay ransom, in the hope that they will unlock your computer.


3. Virus detection– software that monitors for the presence of viruses. This software periodically downloads descriptions of known viruses to scan your computer’s memory and hard drive to detect and alert you about viruses that have been installed.


4. Virus protection– multiple methods that prevent your computer from becoming infected.  Virus protection will assure that files and programs are scanned before they are opened or installed. Remote connections to your computer are blocked unless you have specifically allowed access.


5. Firewall – a firewall can be software or included in physical devices you buy, such as your router. A firewall blocks incoming connections and attacks, typically connections and communications that would expose your computer to breaches. For outgoing requests, like when you are browsing a website, the firewall remembers that the connection came from inside your network, and it allows the response to safely be sent to your computer.


6. Cloud– the Cloud simply refers to servers that you remotely access over the Internet. There has been so much marketing hype around the idea of the Cloud, but the core of the approach is simply not maintaining local software, and instead accessing your account from multiple devices. Think of your music streaming services, your movie services, even your email, all accessible from the Cloud.


7. Phishing – emails designed to trick uses into giving out personal information. It’s simple for people with malicious intent to create a link to a username and password login that looks identical to a legitimate bank. They even add the bank’s logo and perfectly mimic your login page, but the username and password that are entered are instead sent to a person who intends to break into your account.


8. Software-as-a-service (SaaS) – software that leverages the Cloud to outsource a service instead of maintaining it locally.


9. Backup – extra copies of your data in case it’s accidentally deleted, becomes corrupted, or if you’re a victim of a ransomware attack. It’s important to consider how often you backup your data, as well as how long it will take to restore your data in the event of an emergency.


10. Two-factor authentication – 2FA is setting up your account to text you a temporary access code when accessing your account, since a username and password can easily be stolen by someone simply looking over your shoulder or by a computer virus. With 2FA activated, an attacker would need to know your username, password, have physical access to your phone, and be able to open your phone to read the access code.  2FA should be activated on all financial and business critical accounts.


And maybe the most important of all:

11. Tech Support – never, ever trust a phone call initiated by anyone claiming to be “Tech Support.”  Immediately hang up, look up the call center phone number, and dial that yourself to ensure that you’re speaking to a representative of that company.  When you initiate the call back, if they truly have a pending support issue, they will quickly check your account within seconds.

Let OverView Help You Talk Tech

Now that you are prepared to talk “IT,” remember that OverView can manage IT for you. Contact us and we’ll ensure that your computers are fortified if malicious or suspicious attackers attempt to access your username, password, or data.

 


Are you wondering if your business is getting the best deal possible for IT support?

Schedule a free consultation with Ben Hall and find out how your business can save money on this expense.