Blog Story

Breaking Down Jargon: A Guide to Clearer Communication

Everything Tech

18.10.22

Say hi!

For everyday IT users, many of the terms being thrown around by experts can leave you feeling a bit confused! Our customers have told us some phrases that they found a bit baffling, so with this in mind, we have created this handy go-to jargon buster:

IP Address
An Internet Protocol address (IP address) is a numerical label given to a device, almost like a telephone number for your computer. An IP address serves two functions: network interface identification and location setting.

Cloud Computing
Cloud computing allows businesses to store, access, and interact with data over the internet rather than through a local network. Businesses use this to keep onsite storage costs down and to help keep data safe and secure through a dedicated cloud storage company. The purpose of cloud storage is to keep data easily accessible to all users.

Phishing
Phishing is a method that hackers use to trick people into giving them data, access to their system, or credentials. Phishing often involves creating a fake website or email with malicious links or code. You and your staff must understand how best to identify and avoid any phishing emails.

Ransomware
Ransomware is a type of malware, or malicious software, that locks a victim’s data or computing device and threatens to keep it locked — or worse — unless the victim pays the attacker a ransom.

Malware
Malware is software specifically designed to disrupt, damage, or gain unauthorised access to a computer system.

Firewall
In computing, a firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.

MFA – Multi-Factor Authentication
Multi-factor Authentication (MFA) is an authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN. MFA is a core component of a strong Identity and Access Management (IAM) policy. Another way to refer to this is that the first authentication is something you know, a password then the second is something you have usually a mobile phone handset that generates a code.

VPN
VPN stands for “Virtual Private Network” and describes the opportunity to establish a protected network connection when using public networks. VPNs encrypt your internet traffic and disguise your online identity. This makes it more difficult for third parties to track your activities online and steal data.

Wi-Fi
A technology that allows devices to connect to a network using radio waves without the need for any cables. The term Wi-Fi is a unique term that the Wi-Fi Alliance has trademarked. You would need a wireless device to connect to a Wi-Fi network.

If you would like to speak to someone about your IT contact Everything Tech today!

Latest resources

arrow-downarrow-left-greyarrow-leftarrow-right-greyarrow-right-whitearrow-rightblog-storybullet-arrowcase-study-storycloseet-logo2et-logo3et-logo4 footer_icon1footer_icon2footer_icon3footer_icon4footer_icon5 hand-wavingicon-arrow-blueicon-arrow-white-lefticon-arrow-whiteli-checknavigation-iconpress-storysocial_facebooksocial-facebook2social_googleplussocial_instagramsocial_linkedin_altsocial-linkedin2social_pinterestlogo-twitter-glyph-32social_youtubesocial-youtube2user-focusvideo