Jargon Buster: Demystifying IT Terminology
Cybersecurity Edition

Jargon Buster
The jargon buster aims to give simple, plain English explanations of typical words and/or phrases used in security and cybersecurity, making it easier to stay informed.
Zero Trust:
Security approach assuming no inherent trust, requiring continual user and device authentication.
Phishing:
Cyberattack where malicious actors impersonate entities to trick individuals into revealing sensitive information.
Ransomware:
Malicious software encrypting files, demanding ransom for decryption; paying does not guarantee data return.
Malware:
Malicious software (viruses, Trojans, worms, spyware) designed to harm or exploit computer systems.
Penetration Testing (Pen Test):
Simulating cyberattacks to identify system vulnerabilities and weaknesses.
Multi-Factor Authentication (MFA):
Security process requiring two or more forms of identification for enhanced login security.
Firewall:
Network security device or software filtering traffic based on predefined rules, acting as a barrier between trusted and untrusted networks.
Encryption:
Converting data into code to prevent unauthorised access, ensuring unreadability without decryption key.
Cyber Threat Intelligence (CTI):
Information about potential cybersecurity threats, including tactics employed by malicious actors.
Incident Response (IR):
Structured approach to addressing and managing the aftermath of a cybersecurity incident.
Patch Management:
Regularly updating software, operating systems, and applications to fix known vulnerabilities.
DDoS Attack (Distributed Denial of Service):
Attack flooding a target system with traffic from compromised computers (botnets).
Vulnerability Assessment:
Identifying, classifying, and prioritising security vulnerabilities in systems, networks, and applications.
Two-Factor Authentication (2FA):
Security process requiring users to provide two authentication factors for enhanced login security.
Endpoint Security:
Protection of individual devices from cybersecurity threats.
Data Breach: Incident where sensitive data is accessed, disclosed, or stolen by unauthorized individuals or entities.
Security Audit:
Evaluation of an organisation’s security policies, practices, and controls for effectiveness and compliance.
SOC (Security Operations Centre):
Centralised unit monitoring, detecting, and responding to cybersecurity incidents in real-time.
DMZ (Demilitarised Zone):
Network segment separating internal and external networks, often used for public-facing services.
SIEM (Security Information and Event Management):
Software providing real-time analysis of security alerts from various network sources.
Want to learn more about our services?
Other Articles & Blogs
Trust-Led VoIP: Shaping the Future of Business Communication
Trust-Led VoIP: Shaping the Future of Business CommunicationAs businesses adapt to remote work and prepare for the PSTN/ISDN switch-off, Voice over Internet Protocol (VoIP) has become more than a communications upgrade—it’s a foundational tool. But in 2025, one...
Cloud Confidence: Why Businesses Are Moving with Certainty in 2025
Cloud Confidence: Why Businesses Are Moving with Certainty in 2025From data access to digital transformation, the cloud is at the heart of how modern organisations operate. But with growing concerns around cybersecurity, compliance, and control, many business leaders...
What’s New at Unity – NE Expo, Fresh Faces & Open Roles
What’s New at Unity – NE Expo, Fresh Faces & Open RolesUnity Hits the NE Expo! In April, Unity took to Newcastle Racecourse for the North East Expo. Gavin Scotchbrook, Michael Long, and Connor Scotchbrook represented the team among 150 exhibitors and over 1,000...