{"id":268,"date":"2019-10-21T18:03:12","date_gmt":"2019-10-21T18:03:12","guid":{"rendered":"https:\/\/www.limetreelabs.com\/blog\/?p=268"},"modified":"2019-11-07T17:33:52","modified_gmt":"2019-11-07T17:33:52","slug":"it-and-cyber-security-terms-to-know-in-2019","status":"publish","type":"post","link":"https:\/\/www.limetreelabs.com\/blog\/it-and-cyber-security-terms-to-know-in-2019\/","title":{"rendered":"IT and Cyber Security Terms to Know in 2019"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img data-opt-id=1742358664  fetchpriority=\"high\" decoding=\"async\" width=\"801\" height=\"526\" src=\"https:\/\/mlqqfyvmtktq.i.optimole.com\/w:auto\/h:auto\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/10\/it-terms.png\" alt=\"\" class=\"wp-image-270\" srcset=\"https:\/\/mlqqfyvmtktq.i.optimole.com\/w:801\/h:526\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/10\/it-terms.png 801w, https:\/\/mlqqfyvmtktq.i.optimole.com\/w:300\/h:197\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/10\/it-terms.png 300w, https:\/\/mlqqfyvmtktq.i.optimole.com\/w:768\/h:504\/q:mauto\/f:best\/https:\/\/www.limetreelabs.com\/blog\/wp-content\/uploads\/2019\/10\/it-terms.png 768w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/figure>\n\n\n\n<p>Dealing with IT service issues can bring a host of intimidating jargon. Here are some basic IT and cyber security terms and concepts to help you move from &#8220;heh?&#8221; to nodding your head knowingly.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Malware<\/h4>\n\n\n\n<p><strong>Malware<\/strong>, or \u201cmalicious software,\u201d is an umbrella term that describes any malicious program or code that is harmful to systems.<\/p>\n\n\n\n<p>Malware seeks to invade, damage, or disable computers, computer systems, networks, tablets, and mobile devices, often by taking partial control over a device\u2019s operations. Hostile, intrusive, and intentionally nasty. Like the human flu, it interferes with normal functioning.<\/p>\n\n\n\n<p><strong>Malware<\/strong> is all about making money off you illicitly. Although malware cannot damage the physical hardware of systems or network equipment, it can steal, encrypt, or delete your data, alter or hijack core computer functions, and spy on your computer activity without your knowledge or permission.<\/p>\n\n\n\n<p>This is prevented with the Limetree Labs <a href=\"https:\/\/www.limetreelabs.com\/blog\/all-green-core-security\/\">Core Security package<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Ransomware<\/h4>\n\n\n\n<p><strong>Ransomware<\/strong> is a subset of malware in which the data on a victim&#8217;s computer is locked, typically by\u00a0encryption. Then, payment is demanded before the ransomed data is decrypted and access is returned to the victim.<\/p>\n\n\n\n<p>The motive for <strong>ransomware<\/strong> attacks is nearly always monetary. And, unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions for how to recover from the attack. Payment is often demanded in a virtual currency, such as\u00a0Bitcoin,\u00a0so that the cybercriminal&#8217;s identity is not known.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Intrusion protection system (IPS)<\/h4>\n\n\n\n<p>An&nbsp;<strong>intrusion prevention system<\/strong>&nbsp;(IPS) is a&nbsp;<strong>system<\/strong>&nbsp;that monitors a network for malicious activities such as security threats or policy violations. The main function of an IPS is to identify suspicious activity, and then log information, attempt to block the activity, and then finally to report it.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Social engineering<\/h4>\n\n\n\n<p><strong>Social engineering<\/strong> is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices. This allows the hacker to gain access to systems, networks or physical locations, often for financial gain.<\/p>\n\n\n\n<p>Threat actors use social engineering techniques to conceal their true identities and motives and present themselves as a trusted individual or information source. The objective is to influence, manipulate, or trick users into giving up privileged information or access within an organization.<\/p>\n\n\n\n<p>Many social engineering exploits simply rely on people&#8217;s willingness to be helpful. For example, the attacker might pretend to be a co-worker who has some kind of urgent problem that requires access to additional network resources.<\/p>\n\n\n\n<p><strong>Social engineering<\/strong> is a popular tactic among&nbsp;hackers&nbsp;because it is often easier to exploit users&#8217; weaknesses than it is to find a network or software vulnerability. Hackers will often use social engineering tactics as a first step in a larger campaign to infiltrate a system or network and steal sensitive data or disperse&nbsp;malware.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Phishing<\/h4>\n\n\n\n<p><strong>Phishing<\/strong> is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal <strong>personal information<\/strong>, such as passwords and credit card numbers.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Antivirus<\/h4>\n\n\n\n<p><strong>Antivirus software<\/strong> is a class of program designed to prevent, detect and remove&nbsp;malware&nbsp;infections on individual computing devices, networks and IT systems.<\/p>\n\n\n\n<p><strong>Antivirus software<\/strong>, originally designed to detect and remove&nbsp;viruses&nbsp;from computers, can also protect against a wide variety of threats, including other types of malicious software.<\/p>\n\n\n\n<p>This tool is all part of our <a href=\"https:\/\/www.limetreelabs.com\/blog\/all-green-core-security\/\">Core Security package<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Zero-day attacks<\/h4>\n\n\n\n<p>A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn\u2019t have a patch in place to fix the flaw. It has the potential to be exploited by cybercriminals. These attacks can be detrimental to IT and cyber security.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Patch<\/h4>\n\n\n\n<p>A\u00a0<strong>patch<\/strong>\u00a0is a set of changes to a\u00a0computer program\u00a0or its supporting data designed to update, fix, or improve it.\u00a0This includes fixing\u00a0security vulnerabilities\u00a0and other\u00a0bugs, with such patches usually being called\u00a0<strong>bug fixes<\/strong>,\u00a0and improving the functionality,\u00a0usability\u00a0or\u00a0performance. This is critical for IT and cyber security.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Redundant data<\/h4>\n\n\n\n<p><strong>Data redundancy<\/strong>\u00a0is a condition created within a database or\u00a0<strong>data<\/strong>\u00a0storage technology in which the same piece of\u00a0<strong>data<\/strong>\u00a0is held in two separate places. This can mean two different fields within a single database, or two different spots in multiple software environments or platforms. <\/p>\n\n\n\n<p>Next time you hear one of these IT and cyber security terms, hopefully this guide will help. Get in touch with us today to find out just how we can help with your IT woes! Call 208-901-3350 or visit <a href=\"https:\/\/limetreelabs.com\">limetreelabs.com<\/a>.<\/p>\n\n\n<div\n\t\t\t\tid=\"hustle-embedded-id-1\"\n\t\t\t\tclass=\"hustle-ui hustle-inline hustle-palette--gray_slate hustle_module_id_1 module_id_1  \"\n\t\t\t\t\n\t\t\tdata-id=\"1\"\n\t\t\tdata-render-id=\"0\"\n\t\t\tdata-tracking=\"disabled\"\n\t\t\t\n\t\t\t\tdata-intro=\"no_animation\"\n\t\t\t\tdata-sub-type=\"shortcode\"\n\t\t\t\t\n\t\t\t\tstyle=\"opacity: 0;\"\n\t\t\t\taria-label=\"Become an Insider popup\"\n\t\t\t><div class=\"hustle-inline-content\"><div class=\"hustle-optin hustle-optin--default\"><div class=\"hustle-success\" data-close-delay=\"10000\" style=\"display: none;\"><span class=\"hustle-icon-check\" aria-hidden=\"true\"><\/span><div class=\"hustle-success-content\"><\/div><\/div><div class=\"hustle-layout\"><div class=\"hustle-main-wrapper\"><div class=\"hustle-layout-body\"><div class=\"hustle-layout-content hustle-layout-position--above\"><div class=\"hustle-content\"><div class=\"hustle-content-wrap\"><div class=\"hustle-group-title\"><h3 class=\"hustle-title\">Become an Insider<\/h3><h4 class=\"hustle-subtitle\">Get a monthly roundup of IT tips, stories and insights from our pros.<\/h4><\/div><\/div><\/div><\/div><form class=\"hustle-layout-form\" novalidate=\"novalidate\"><div class=\"hustle-form hustle-form-inline\"><div class=\"hustle-form-fields hustle-proximity-joined\"><div class=\"hustle-field hustle-field-icon--static hustle-field-required \"><label for=\"hustle-field-email-module-1\" id=\"hustle-field-email-module-1-label\" class=\"hustle-screen-reader\">Your email<\/label><input id=\"hustle-field-email-module-1\" type=\"email\" class=\"hustle-input \" name=\"email\" value=\"\" aria-labelledby=\"hustle-field-email-module-1-label\" data-validate=\"1\" \/><span class=\"hustle-input-label\" aria-hidden=\"true\" style=\"flex-flow: row nowrap;\"><span class=\"hustle-icon-email\"><\/span><span>yourname@example.com<\/span><\/span><\/div><div class=\"hustle-field hustle-field-icon--static \"><label for=\"hustle-field-first_name-module-1\" id=\"hustle-field-first_name-module-1-label\" class=\"hustle-screen-reader\">First Name<\/label><input id=\"hustle-field-first_name-module-1\" type=\"name\" class=\"hustle-input \" name=\"first_name\" value=\"\" aria-labelledby=\"hustle-field-first_name-module-1-label\" data-validate=\"\" \/><span class=\"hustle-input-label\" aria-hidden=\"true\" style=\"flex-flow: row nowrap;\"><span class=\"hustle-icon-name\"><\/span><span>First Name<\/span><\/span><\/div><div class=\"hustle-field hustle-field-icon--static \"><label for=\"hustle-field-last_name-module-1\" id=\"hustle-field-last_name-module-1-label\" class=\"hustle-screen-reader\">Last Name<\/label><input id=\"hustle-field-last_name-module-1\" type=\"name\" class=\"hustle-input \" name=\"last_name\" value=\"\" aria-labelledby=\"hustle-field-last_name-module-1-label\" data-validate=\"\" \/><span class=\"hustle-input-label\" aria-hidden=\"true\" style=\"flex-flow: row nowrap;\"><span class=\"hustle-icon-name\"><\/span><span>Last Name<\/span><\/span><\/div><button class=\"hustle-button hustle-button-submit \" aria-live=\"polite\" data-loading-text=\"Form is being submitted, please wait a bit.\"><span class=\"hustle-button-text\">Submit<\/span><span class=\"hustle-icon-loader hustle-loading-icon\" aria-hidden=\"true\"><\/span><\/button><\/div><\/div><input type=\"hidden\" name=\"hustle_module_id\" value=\"1\"><input type=\"hidden\" name=\"post_id\" value=\"0\"><input type=\"hidden\" name=\"hustle_sub_type\" value=\"shortcode\"><div class=\"hustle-error-message\" style=\"display: none;\" data-default-error=\"Please fill out all required fields.\"><\/div><\/form><\/div><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dealing with IT service issues can bring a host of intimidating jargon. Here are some basic IT and cyber security terms and concepts to help you move from &#8220;heh?&#8221; to nodding your head knowingly. Malware Malware, or \u201cmalicious software,\u201d is an umbrella term that describes any malicious program or code that is harmful to systems. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":270,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[45],"tags":[43,4,38],"class_list":{"0":"post-268","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security","8":"tag-cyber-security","9":"tag-it","10":"tag-managed-it-services","11":"entry"},"_links":{"self":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":5,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/268\/revisions"}],"predecessor-version":[{"id":346,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/posts\/268\/revisions\/346"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/media\/270"}],"wp:attachment":[{"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/media?parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/categories?post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.limetreelabs.com\/blog\/wp-json\/wp\/v2\/tags?post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}