Book A book icon Megaphone A megaphone icon Chat A chat bubble Calendar A calendar symbol Calendar alternative A calendar symbol Menu A menu symbol for navigation print A computer printer symbol Location A map location marker Location alternative A map location marker Phone A phone symbol User A human silhouette indicating login Document A document symbol Facebook Facebook social media icon Facebook Facebook social media icon Twitter Twitter social media icon Twitter circled Twitter social media icon YouTube YouTube social media icon YouTube YouTube social media icon YouTube Play icon YouTube social media icon Vimeo Vimeo social media icon Vimeo circled Vimeo social media icon LinkedIn LinkedIn social media icon LinkedIn circled LinkedIn social media icon Instagram Instagram social media icon Instagram circled Instagram social media icon Pinterest Pinterest social media icon Pinterest circled Pinterest social media icon Mobile A mobile phone Tablet A tablet symbol Laptop A laptop computer symbol Desktop A desktop computer display Pencil A pencil symbol Ok A checkmark symbol cancel-circle A X symbol Plus An addition symbol Minus A subtraction symbol Heart A heart symbol Star A star symbol Videocam A video camera symbol Caret A small triangle symbol Newspaper A newspaper symbol Cart A shopping cart Tools A hammer and a wrench symbol Flag A flag symbol home home-desc Photo A photograph symbol Audio A speaker with sound symbol Cog A group of cogs symbol RSS A RSS feed symbol Comment A speech bubble symbol Link A chain link symbol Export An export arrow symbol Envelope An envelope symbol Search A magnifying glass symbol Info An information symbol Info circled An information symbol Help circled A question mark symbol Clock A clock symbol Globe A globe symbol Globe alternative A globe symbol none none

10 Security Terms You Need to Know

No partner can be an expert in everything.  If you’re not a security expert, you can still bring the right security solutions to your customers. Rest assured, nobody will expect you to rattle off the intricacies of advanced threat detection during a sales call.  Still, it’s imperative that you at least know the basics about protecting business information systems so you don’t get caught off guard and find yourself at a loss for words when communicating with customers. 

Here is a glossary of 10 must-know security terms that will help you sound like a seasoned cybersecurity veteran:  

1. Access control: Not all information should be accessed publicly in the cloud. As such, it’s important that businesses have access controls in place, which work like security checkpoints protecting particular folders. A strong, centralized access control system helps prevent internal data leaks and blocks old employees or partners who may try to access the network. 

2. Identity management: Along with access control comes identity management, which refers to the distribution of individual employee accounts. 

3. Malware: Malware is software that, once embedded onto a computer or network, enables hackers to carry out disruptive tasks. Malware can be used to restrict access, steal information, or assume control over a machine. There are many different types of malware. 

4. Ransomware: This is a particular form of malware that you need to know about, since it’s spreading like wildfire in 2016! In a ransomware attack, a hacker will embed malware that locks access to the network. This is done with the stipulation that if a payment is not made, the files will be destroyed. 

5. Software vulnerability: This is a weakness in the software code that, once exploited, can allow a hacker to embed malware into an operating system. Software vulnerabilities must be quickly identified and “patched”—or fixed—to prevent a cyberattack. 

6. Data breach: When sensitive information is exposed to an unauthorized third party, this is referred to as a data breach. A data breach can involve consumer information, like health records and financial records, or intellectual property. 

7. Two-factor authentication: Two-factor—or multi-factor—authentication involves using a secondary security measure to fortify end users’ accounts. For years, SMS has been one of the most popular two-factor authentication strategies. In the near future, however, SMS-based two-factor authentication will no longer be an acceptable way to authenticate end users. Now, many companies are exploring biometric-based security technologies. 

8. Threat campaign: Most cyberattacks against businesses are not isolated incidents. They are typically part of larger, organized plans called “campaigns.” Campaigns often last for years, while the hackers gather enough intelligence to launch a sophisticated attack against a network. 

9. Zero-day flaw: Sometimes, hacks happen very quickly. When an operating system is compromised before a software vulnerability is identified, it’s called a zero-day flaw. Since they can catch companies completely off-guard, zero-day flaws can be devastating. It can take a long time to come up with a solution.

10. Back door: A back door is a method of entering a computer network without having to go through the official security checkpoints (like a password or fingerprint scanner). Back doors are used by programmers, who create them for easy troubleshooting access, and by hackers. 

These are just a few of the many terms you will have to know to sell network security solutions. Have questions about these terms, or any others? Contact us today! Our team will be glad to help