No partner can be an expert in everything. If you’re not a security expert, you can still bring the right security solutions to your customers. Rest assured, nobody will expect you to rattle off the intricacies of advanced threat detection during a sales call. Still, it’s imperative that you at least know the basics about protecting business information systems so you don’t get caught off guard and find yourself at a loss for words when communicating with customers.
Here is a glossary of 10 must-know security terms that will help you sound like a seasoned cybersecurity veteran:
1. Access control: Not all information should be accessed publicly in the cloud. As such, it’s important that businesses have access controls in place, which work like security checkpoints protecting particular folders. A strong, centralized access control system helps prevent internal data leaks and blocks old employees or partners who may try to access the network.
2. Identity management: Along with access control comes identity management, which refers to the distribution of individual employee accounts.
3. Malware: Malware is software that, once embedded onto a computer or network, enables hackers to carry out disruptive tasks. Malware can be used to restrict access, steal information, or assume control over a machine. There are many different types of malware.
4. Ransomware: This is a particular form of malware that you need to know about, since it’s spreading like wildfire in 2016! In a ransomware attack, a hacker will embed malware that locks access to the network. This is done with the stipulation that if a payment is not made, the files will be destroyed.
5. Software vulnerability: This is a weakness in the software code that, once exploited, can allow a hacker to embed malware into an operating system. Software vulnerabilities must be quickly identified and “patched”—or fixed—to prevent a cyberattack.
6. Data breach: When sensitive information is exposed to an unauthorized third party, this is referred to as a data breach. A data breach can involve consumer information, like health records and financial records, or intellectual property.
7. Two-factor authentication: Two-factor—or multi-factor—authentication involves using a secondary security measure to fortify end users’ accounts. For years, SMS has been one of the most popular two-factor authentication strategies. In the near future, however, SMS-based two-factor authentication will no longer be an acceptable way to authenticate end users. Now, many companies are exploring biometric-based security technologies.
8. Threat campaign: Most cyberattacks against businesses are not isolated incidents. They are typically part of larger, organized plans called “campaigns.” Campaigns often last for years, while the hackers gather enough intelligence to launch a sophisticated attack against a network.
9. Zero-day flaw: Sometimes, hacks happen very quickly. When an operating system is compromised before a software vulnerability is identified, it’s called a zero-day flaw. Since they can catch companies completely off-guard, zero-day flaws can be devastating. It can take a long time to come up with a solution.
10. Back door: A back door is a method of entering a computer network without having to go through the official security checkpoints (like a password or fingerprint scanner). Back doors are used by programmers, who create them for easy troubleshooting access, and by hackers.
These are just a few of the many terms you will have to know to sell network security solutions. Have questions about these terms, or any others? Contact us today! Our team will be glad to help