Even if you don't work in an IT department, you interact with technology daily. You don't need to understand all the nuances of the various concepts and applications, but, at the very least, you should know some basics. Below are ten technology terms you might encounter.
1. Multi-Factor or Two-Factor Authentication:
A second layer security measure for accessing an account. In addition to entering your username and password (the first authentication factor), you must provide an additional credential. The second credential typically is a randomly generated number or prompt on your phone to finish signing in to your account.
2. Office 365:
A subscription online software service provided by Microsoft. Depending on your subscription plan, Office 365 can include email, the Microsoft Office software suite, and numerous other collaboration and communication tools.
3. Phishing:
An attempt by a cybercriminal to obtain your password, credit card, or other confidential information via email. Phishing uses deceptive emails and websites that claim and appear to be from legitimate entities.
4. SaaS:
Also known as software as a service. SaaS is a method of licensing an application where it is purchased with a subscription that allows access online. Typically, the application is not installed or hosted on local computers, but in a cloud and usually accessed via web pages.
5. Cloud Hosting:
Instead of managing your own physical server equipment, cloud hosting outsources to a cloud provider, such as Microsoft Azure or Amazon AWS, for storage and computing resources. Cloud hosting is spread across hundreds of virtual servers in the cloud providers network.
6. SIEM:
Also known as security information and event management (SEIM). This is a software solution that collects and analyzes log event data in real-time from network devices and applications to provide IT threat monitoring, event correlation and incident response.
7. Business Continuity:
A way of creating a system of prevention and recovery plans to handle potential threats to a company. Business continuity is an organization's ability to ensure operations and core business functions are not severely impacted if some unplanned incident, such as a natural disaster or cyberattack, takes critical systems offline.
8. Centralized Password Management:
This consolidates account login credentials for multiple applications and devices across an organization's network in one single application that requires only one login for access. It also allows IT administers more control over user security.
9. Disk Encryption:
A technology, such as Windows BitLocker, that protects information on a computer's hard drive or USB flash drive by converting the data into unreadable code that cannot be deciphered easily by unauthorized people. A password key is required to decrypt the data.
10. Business Intelligence:
A technology-driven process of gathering data about various aspects of the business from multiple sources, analyzing the data, and converting that data into information and actionable insights that can be used to make strategic decisions.
As the use of technology continues to increase, it’s critical to have a general understanding of its main concepts and applications. This list of decoded terms will equip you with the knowledge necessary to better comprehend and use the various technological systems in our world today. For more information or questions, please contact Lutz Tech.