cybersecurity reference guide

dictionary of IT security terms, phrases and acronyms

Phishing
A technique for acquiring sensitive information, or accessing information, under the guise of legitimacy using digital technology, usually email. Its intent is to deceive someone into responding to what appears to be a known entity but is really a fake. Not all phishing is harmful; some organizations use it as a training and security assessment tool.
Multi-Factor Authentication (MFA)
Two-factor Authentication (2FA)
Authenticator
Password
Patch
Patch Management
Formjacking
Distributed Denial of Service (DDoS)
Domain Name System (DNS)

The naming system for computers and computing services on a network. The DNS connects common name expressions to the numerical address of the network device. DNS ensures that email data is routed to the appropriate email servers and web traffic is routed to web servers, for example.

Because DNS is at the very core of IP traffic, Cisco incorporates aspects of its framework to analyze and mitigate harmful network activity on a business’ internal network. See Cisco Umbrella.

For more insights into IT and cybersecurity, visit our blog.

free trials

Off-board your IT management to industry experts to keep your business tech secure and optimized so your teams can get back to business initiatives. Contact one of our IT consultants in Chicago to find out what secure, scalable, and optimized solutions are right for you.

SECURITY REVIEW FOR OFFICE 365
FREE TRIAL

ONE TIME PHISHING TEST
FREE TRIAL

VULNERABILITIES SCAN & REPORT
FREE TRIAL