Table of Contents

# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

#

24/7 NETWORK MONITORING

Continuous oversight of a network aimed at detecting and responding to any irregular activities or threats promptly to minimize downtime and threats.

Back to top.

A

API (Application Programming Interface)

A set of rules, protocols, and tools for building software and applications. It allows different software entities to communicate with each other.

Back to top.

B

BACKUP

A copy of data taken and stored elsewhere so that it may be used to restore the original after a data loss event.

BANDWITH

The maximum rate of data transfer across a given path. It can refer to internet connectivity or data communication resources.

BOTNET

A network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.

BUSINESS CONTINUITY AND RESILIENCE

Strategies and processes designed to ensure operational continuity and resilience in the face of disruptions, ensuring minimal impact to business activities.

Back to top.

C

CARRIER SERVICES

Telecommunications services and solutions provided by a carrier (or telecommunications service provider) including broadband internet, telephone services, and mobile data connectivity.

CLOUD COMPUTING

The delivery of computing services over the internet, allowing for on-demand access to computing resources without direct active management by the user.

CLOUD STORAGE

A service model in which data is maintained, managed, backed up remotely, and made available to users over a network (typically the Internet).

CHAT ROOM

This data was discovered in a hidden Dark Web internet relay chatroom (IRC).

CO-MANAGED IT SERVICES

A collaborative IT service model where the in-house IT department and external IT service provider work together to manage and improve the organization’s IT infrastructure, providing a blend of internal control with external expertise.

CYBERSECURITY SOLUTIONS

Comprehensive tools, policies, security practices, and services designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Aimed at ensuring the integrity, confidentiality, and availability of information.

Back to top.

D

DATA BACKUP SERVICES

The process of duplicating and storing organizational data in secure, remote servers or on physical storage devices to ensure data integrity and recovery in case of loss due to accidental deletion, cyberattacks, or disaster.

DARK WEB MONITORING

The process of searching, monitoring, and analyzing the internet's hidden corners (dark web) to identify and mitigate potential threats before they can impact your business.

DISASTER RECOVERY PLANNING

A strategic approach focusing on preparing for and recovering from any event that causes a loss of data, applications, or infrastructure. It ensures business continuity by minimizing downtime and data loss in such scenarios.

DDoS (DISTRIBUTED DENIAL OF SERVICE)

An attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

DNS (DOMAIN NAME SYSTEM)

The system that translates human-friendly domain names (like example.com) into IP addresses that computers use to identify each other on the network.

Back to top.

E

EMAIL AND SPAM PROTECTION

Services aimed at securing an organization’s email communication. These solutions filter out spam, phishing attempts, and malicious emails, and protect sensitive information from being compromised.

ENCRYPTION

The process of converting information or data into a code, especially to prevent unauthorized access.

ENDPOINT PROTECTION

Security measures designed to protect the endpoints of an enterprise network, such as desktops, laptops, and mobile devices, from cybersecurity threats. This includes antivirus software, firewalls, and advanced endpoint detection and response solutions.

ENDPOINT DETECTION & RESPONSE (EDR)

A cybersecurity technology used to continually monitor and respond to mitigate cyber threats at endpoint devices like computers, mobile devices, and servers.

Back to top.

F

FILE SHARING

The IP address has been identified as associated with malicious file sharing activities.

FIREWALL

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Back to top.

G

GDPR (GENERAL DATA PROTECTION REGULATION)

A regulation in EU law on data protection and privacy in the European Union and the European Economic Area.

Back to top.

H

HASHING

A function that converts an input (or 'message') into a fixed-size string of bytes. The output is typically a 'digest' that is unique to each unique input.

HTTP (HYPERTEXT TRANSFER PROTOCOL)

An application protocol for distributed, collaborative, hypermedia information systems. It is the foundation of data communication for the World Wide Web.

HTTPS (HYPERTEXT TRANSFER PROTOCOL SECURE)

An extension of HTTP for secure communication over a computer network, widely used on the Internet.

Back to top.

I

IDS/IPS (INTRUSION DETECTION SYSTEM/INTRUSION PREVENTION SYSTEM)

A network security technology designed to detect and prevent vulnerability exploits against a target by monitoring network or system activities.

ID THEFT FORUM

This data was discovered being exchanged on a dark web forum or community associated with ID theft activities.

IP ADDRESS (INTERNET PROTOCOL ADDRESS)

A numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

IOT (INTERNET OF THINGS)

The interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.

IT ASSESSMENT AND AUDIT

A comprehensive evaluation of an organization’s IT infrastructure, policies, and operations. This assessment identifies strengths, weaknesses, and opportunities for improvement to align IT strategies with business objectives.

Back to top.

J

JAVA

A high-level, class-based, object-oriented programming language that is designed to have as few implementation dependencies as possible.

JSON (JAVASCRIPT OBJECT NOTATION)

A lightweight data-interchange format that is easy for humans to read and write and for machines to parse and generate.

Back to top.

K

KEYLOGGER

A type of surveillance software (considered spyware) that has the capability to record every keystroke you make to a log file, usually without the user's knowledge.

Back to top.

L

LAN (LOCAL AREA NETWORK)

A network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, or office building.

Back to top.

M

MALWARE

Any software intentionally designed to cause damage to a computer, server, client, or computer network.

MANAGED IT SERVICES

Outsourced IT services that provide infrastructure design, support, and management to improve productivity and cost-effectiveness. Tailored to help organizations in senior living, healthcare, and general business meet their strategic goals through technology.

MANDAGED DETECTION & RESPONSE (MDR)

A comprehensive managed service that provides organizations with threat hunting, monitoring, and response services through advanced security technologies and a team of experts.

MOBILE DEVICE MANAGEMENT (MDM)

A type of security software used by IT departments to monitor, manage, and secure employees' mobile devices that are deployed across multiple mobile operating systems and service providers.

Back to top.

N

NETWORK

A collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of data.

NETWORK INFRASTRUCTURE AND CABLING

The foundational IT services involving the physical and virtual resources that support the network connectivity, communication, operations, and management of an enterprise network. Includes the setup and maintenance of all network hardware and cabling.

NETWORK PROTOCOL

A set of rules and conventions for communication between network devices. Examples include TCP/IP, HTTP, and FTP.

Back to top.

O

OPEN SOURCE

Software for which the original source code is made freely available and may be redistributed and modified.

Back to top.

P

P2P FILE

This data was discovered as part of a file being exchanged through a peer-to-peer file sharing service or network.

PHISHING

The fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

PUBLIC WEB SITE

This data was discovered on a publicly-accessible web forum or data dump site.

Back to top.

Q

QUERY

A request for data or information from a database table or combination of tables.

Back to top.

R

RAM (RANDOM ACCESS MEMORY)

A type of computer memory that can be accessed randomly, any byte of memory can be accessed without touching the preceding bytes.

RANSOMWARE

A type of malicious software designed to block access to a computer system until a sum of money is paid.

REMOTE MONITORING AND MANAGEMENT (RMM)

A category of services that provide IT professionals with monitoring and managing endpoints, computers, mobile devices, and networks remotely. It’s aimed at maintaining and anticipating issues for improved operational efficiency.

Back to top.

S

SIEM (SECURITY INFORMATION AND EVENT MANAGEMENT)

Software products and services that combine security information management (SIM) and security event management (SEM) to provide real-time analysis of security alerts generated by applications and network hardware.

SOCIAL MEDIA

This data was discovered being shared as a post on a social media platform.

SOFTWARE AS A SERVICE (SAAS) MANAGEMENT

The management of third-party cloud applications provided over the internet. It involves selecting the right SaaS solutions, negotiating contracts, managing subscriptions, ensuring security, and optimizing the usage and performance of the software.

SSL (SECURE SOCKETS LAYER)

The standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private.

SQL (STRUCTURED QUERY LANGUAGE)

A standard programming language for managing and manipulating relational databases.

Back to top.

T

TECHNOLOGY CONSULTING

Advisory services that help businesses assess various technology strategies and, in alignment with their business or process strategies, utilize technology to improve their process, products, or services.

TROJAN HORSE

Any malicious computer program which misleads users of its true intent. The term is derived from the Ancient Greek story of the deceptive Trojan Horse that led to the fall of the city of Troy.

Back to top.

U

URL (UNIFORM RESOURCE LOCATOR)

A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

Back to top.

V

VIDEO SURVEILLANCE

A security and monitoring solution that involves the use of video cameras to transmit a signal to a specific place, allowing for live or recorded visual monitoring of a location for safety, security, and operational efficiency purposes.

VIRTUAL CHIEF INFORMATION OFFICER (vCIO) SERVICES

Strategic consulting services that provide leadership, strategy, and expert guidance on the technology-related aspects of an organization’s operations, akin to what an in-house CIO would offer.

VOIP SOLUTIONS

Voice over Internet Protocol, a technology that allows users to make voice calls using a broadband internet connection instead of a traditional (or analog) phone line. This can include features like voicemail, call routing, and integrated video calls.

VULNERABILITY ASSESSMENT

The process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in a system.

VPN (VIRTUAL PRIVATE NETWORK)

A service that allows you to connect to the Internet via a server run by a VPN provider, encrypting your data and hiding your IP address.

Back to top.

W

WAN (WIDE AREA NETWORK)

A telecommunications network that extends over a large geographic area for the primary purpose of computer networking.

WEBPAGE

This data was discovered on a hacker website or data dump site.

WIRELESS NETWORK MANAGEMENT

The process of designing, securing, managing, and optimizing a wireless network to ensure reliable and efficient connectivity. It encompasses the deployment and maintenance of wireless networking hardware and software.

WHALING

A specific kind of phishing attack that targets high-profile employees, such as the CEO or CFO, in order to steal sensitive information from a company.

Back to top.

X

XML (EXTENSIBLE MARKUP LANGUAGE)

A markup language that defines a set of rules for encoding documents in a format that is both human-readable and machine-readable.

XSS (CROSS-SITE SCRIPTING)

A security vulnerability typically found in web applications. It enables attackers to inject client-side scripts into web pages viewed by other users.

Back to top.

Z

ZERO ACCESS

The IP address has been identified as associated with the Zero Access botnet. At the time of discovery, the ZeroAccess rootkit responsible for the botnet's spread is estimated to have been present on at least 9 million systems (2012).

ZERO-DAY EXPLOIT

A cyber-attack that occurs on the same day a weakness is discovered in software, before the software developer has an opportunity to create a patch to fix the vulnerability.

Back to top.