





Helping Keep Small Business CYBERSafe!
CYBERInsights – First For Small Business Cybersecurity Best Practice & Advice …Â
#CyberInsights #CyberAwareness #CyberSafe #SME #SmallBusiness
#CyberInsights #CyberSecurity #Glossary
CYBER GLOSSARY:Â We have put together a CYBERInsights Glossary to Help Small Businesses learn some of the mind boggling terms that are commonly used in Cybersecurity.
AML – Anti Money Laundering
AVS –Â Anti Virus Software
BOTNET – A group of computers which have been infected by malware
CTI – Cyber Threat Intelligence
DATA BREACH – Where Data has been compromised
DDoS – A malicious attempt to Disruption of normal web traffic
ENCRYTION – A function that makes data unreadable
FIREWALL – system to detects suspicious activities & generates alerts.
ICT – Information and Communications Technology
IPS – A security tool that monitors a network for malicious activity
MALWARE – Malicious software eg. viruses, trojans, worms etc.
MFA– Two-factor or multi-factor authentication
MDR – Managed detection and response
MSP – Managed Service Provider
NIS2 – Network and Information Security Directive
PATCHING – Updates to firmware or software to improve security
PHISHING – Targets email, phone, or text with the intention to defraud
PORTS – Transport protocol for network data, to sort traffic
RANSOMWARE – Malicious software that holds users to ransom
ROUTER – Device used to direct and route traffic around a network.
RMM – Remote Monitoring and Management
SIEM – Security Information and Event Management
SMISHING – Phishing via SMS
SOC – Security Operations Centre
SOCIAL ENGINEERING – Manipulating people to divulge sensitive info
SPYWARE – Malware designed to collect and steal sensitive information
TDIR – Threat detection & Incident Reporting
VIRUS – Malicious software that infects software & systems
VPN – A secure connection, that encrypts all traffic between 2 devices
VULNERABILITYÂ – A weakness, or flaw, in software, a system or process.
XDR – Extended Detection & Response
WAP – Wireless Access Points emit a signal to give wireless coverage
CYBER Insights – Helping Keep Small Business CYBERSafe!Â
Launched in 2020 by Cybersecurity Journalist Iain Fraser and his team at IfOnly… CYBERInsights was developed to be the go-to platform providing definitive, reliable & actionable Cybersecurity News, Intel, Awareness & Training specifically written and curated for Small Business & Enterprise Owners, Partners and Directors throughout the UK. #CyberInsights #CyberSecurity #CyberAttack #CyberAwareness #Compliance #DDoS #Fraud #Ransomware #ScamAlert #SME #SmallBusiness #SmallBusinessOwner #ThreatIntel Â















