[digi-tal trans-for-mation] / adjective - noun
Digital transformation describes the implementation and
modification of digital technologies within a business, carried
out to improve that business’ operations and services.
Businesses often opt to rethink their digital strategies in order
to increase client satisfaction - delivering optimised services
and value to clients.
[man-aged ser-vices] / adjective - noun
Managed services are administered by a trusted Managed
Service Provider (MSP). Businesses opt to partner with an MSP
in order to receive tailored IT solutions; MSPs are responsible
for delivering, installing and maintaining core IT systems and
software. Managed services are favoured for the benefit of
increased scalability, a minimised threat of downtime, and
24/7 access to IT experts.
[con-nec-tiv-ity] / noun
Connectivity describes a device's ability to link to and
communicate with other electronic devices, systems, software,
and the internet. As a flexible and digitally connected business
is essential for growth and development, businesses must
enhance their workplace connectivity through the
implementation of digital transformation strategies.
[cloud com-pu-ting] / adjective - noun
Cloud computing is the delivery of IT services via the internet;
these services include servers, storage, databases and other
crucial business components. This method of using a network
of remote servers hosted in the Cloud to store, manage and
process data reduces a business' need for onsite hardware
and physical maintenance.
[dev-ice de-ploy-ment] / noun
Device deployment encompasses all the processes involved in
delivering new software or hardware in its intended
environment - including installation, configuration, running
and testing. With the help of services such as Microsoft
Autopilot, device configuration and set-up can be completed
from any location, expediting device deployment for
[the meta-verse] / noun
At its core, the Metaverse is a virtual reality world that allows
users to interact, game, and experience things as they would
in the real world. Using current Augmented Reality (AR) and
Virtual Reality (VR) tech, users can immerse themselves in this
virtual world and interact with objects and people that are
being projected within the space.
[cy-ber essen-tials] / noun
The Cyber Essentials Framework is a government backed IT
accreditation administered by IASME. The framework was
created to ensure businesses have the very best cybersecurity
practices in place, so clients can be reassured that their data is
secure and protected. The accreditation provides a powerful
level of security credibility for businesses, encouraging client
growth and improved business reputation.
[se-curity pos-ture] / adjective - noun
An enterprise’s security posture is determined by the strength
of its networks, information, and systems based on
information security resources (e.g., people, hardware,
software, policies), and the controls and protocols in place for
predicting and preventing cyber-attacks. Maintaining ironclad
cybersecurity practices is essential for businesses to protect
their clients' interests and business reputation.
[da-ta] / noun
Data is the information processed or stored by a computer or
device; business data specifically refers to the data and
personal information accessed, processed, collected, stored or
disseminated by an enterprise. Businesses are increasingly
opting to store their data within the Cloud, as this minimises
on-site hardware and provides additional data security.
[soft-ware as a ser-vice] / noun - adjective
Software as a Service (SaaS) is a cloud based method of
delivering software. Businesses can opt to access their software
and applications through the internet, removing the need for
the installation, maintenance and use of complex software and
hardware. SaaS applications usually run as a subscription
service via a SaaS provider’s servers; with the provider managing
application access, security, and performance.
[vir-tu-al pri-vate net-work] / noun
A virtual private network (VPN) extends a private network across
a public network and enables users to send and receive data
across shared networks as if their computing devices were
directly connected to the private network. It works by hiding
your IP address by letting the network redirect it through a
specially configured remote server run by a VPN host. A VPN
encrypts your connection and disguises your data traffic online
and protects it from external access.
[cy-ber-se-cu-ri-ty] / noun
Cybersecurity is the practice of deploying people, policies,
processes and technologies to protect organizations, their
critical systems and sensitive information from digital attacks.
It's core function is to protect various devices, and services from
unauthorised access to the vast amounts of personal
information we store on these devices, and online.
[en-cryp-tion] / noun
Encryption is a way of scrambling data so that only authorized
parties can understand the information. In technical terms, it is
the process of converting human-readable plaintext to
incomprehensible text, also known as ciphertext.
[fire-wall] / noun
A firewall is a network security device that monitors incoming
and outgoing network traffic and permits or blocks data packets
based on a set of security rules. Its purpose is to establish a
barrier between your internal network and incoming traffic from
external sources (such as the internet) in order to block
malicious traffic like viruses and hackers.
[ran-som-ware] / noun
Ransomware holds victims' devices and data hostage or makes
systems unusable until a ransom is paid. Acting as a block when
deployed, this will prohibit your access to your device until you
pay the ‘ransom’ fee to its creator, often being very expensive
and difficult to remove
[pen-test] / noun
Pentest, short for penetration testing, means testing a network,
computer or system for weaknesses. Also known as ethical
hacking, it involves attempting to hack in to check for vulnerable
spots that real attackers could exploit. Results of the
penetration tests are then compiled into a report detailing the
specific vulnerabilities that were exploited, sensitive data that
was accessed and the amount of time the pen tester was able to
remain in the system undetected.
[pat-ching] / noun
Patching is the process of creating and implementing a
temporary policy that is used to mitigate exploitation risks
associated with the discovery of new security vulnerabilities. It
eliminates the potential threat of application or system security
loopholes being identified and exploited by hackers.
[phish-ing] / noun
Phishing attacks are performed at scale and involve fraudulent
emails being sent to unsuspecting users. Phishing attacks often
appear to come from trusted sources (banks, brands, or even
colleagues etc.) but link to malicious sites or files that aim to
either download malware or steal sensitive information. These
attacks rely on creating urgency - requiring users to act to avoid
negative consequences (such as fraudulent activity or
undeliverable post for example). This social attack aims to
manipulate vulnerable users - be it those who are timepoor,
unaware or unsuspecting and uses these instances to obtain
sensitive information that can either be sold or used as part of
[spear phish-ing] / noun
Spear phishing is a cyber attack method where hackers set up a
targeted email scam, directly addressed to the victim. The
hacker attempts to convince the victim that they are familiar
with the sender. The sole purpose of spear phishing is to obtain
unauthorised access to sensitive data.
[whal-ing] / noun
Whaling is a form of spear phishing that specifically target high-
level executives. Similar to spear-phishing, the hacker attempts
to convince the victim that they are familiar with the sender.
Whaling takes more time and investment in researching and
crafting these highly targeted messages or emails. Whaling
usually targets those with direct access to financial or payroll
[multi-ple fact-or auth-enti-cation] / noun
MFA stands for multiple factor authentication is a security
measure that requires two or more forms of verification to
access an account. It works using a username and password in
combination with other pieces of evidence. These pieces of
evidence could include a four-to-six-digit, one-time code sent to
email or to the users’ mobile phone, a PIN/passcode or a secret
[an-ti-vi-rus] / noun
This is software that is used for scanning and removing viruses
from a computer. It can be scanned automatically and manually.
The automatic scan may check files that have been downloaded
and files created by software installers. It can also scan the hard
drive regularly. The manual scan allows the user to scan
individual files or the whole system whenever they believe it to
[al-go-rithm] / noun
An algorithm is a set of instructions designed to preform a
specific task. Search engines use algorithms use proprietary
algorithms to display the most relevant results. In computer
programming, algorithms are created as functions.
[a-zure] / noun
Azure is a cloud-computing platform built and operated by
Microsoft. It allows companies to run applications and host
content in the cloud. While Microsoft designed Azure to support
enterprise computing requirements the service is also available
to small businesses.
[brow-ser fin-ger-print-ing] / noun
Browser fingerprinting is a method that websites use to identify
or partially identify individuals’ users or devices, even when
cookies are turned off. A browser fingerprint includes the
browser type and version, as well as your operating system,
active plugins, time zone, language and screen resolution etc.
[e-ther-net] / noun
Ethernet is the standard way to connect computers on a
network over a wired connection. It provides a simple interface
and for connecting multiple devices, such computers, routers,
and switches. With a single router and a few Ethernet cables,
you can create a LAN, which allows all connected devices to
communicate with each other.
[threat act-or] / noun
Any person or organisation that intentionally causes harm in the
digital sphere. They exploit weaknesses in computer, networks
and systems to carry out attacks on individuals or organisations.
[ar-ti-fi-cial in-tel-li-gence] / noun
Often referred to as AI, it is the ability of a computer to act like a
human being, mimicking the problem making and decision-
making capabilities of the human mind.
[de-bug] / noun
Programs sometimes have small errors, called "bugs," in them.
These bugs can be minor, such as not recognizing user input, or
more serious, such as a memory leak that crashes the program.
Before releasing their software to the public, programmers
"debug" their programs, eliminating as many errors as possible.
This debugging process often takes a long time, as fixing some
errors may introduce others.
[de-cryp-tion] / noun
Decryption is the process of converting encrypted data into
recognizable information. It is the opposite of encryption, which
takes readable data and makes it unrecognizable. Files and data
transfers may be encrypted to prevent unauthorized access. If
someone tries to view an encrypted document, it will appear as
a random series of characters. If someone tries to "snoop" on an
encrypted network connection, the data will not make any
[en-cod-ing] / noun
Encoding is the process of converting data from one form to
another. While "encoding" can be used as a verb, it is often used
as a noun, and refers to a specific type of encoded data. There
are several types of encoding, including image encoding, audio
and video encoding, and character encoding.
[dig-i-tal foot-print] / noun
A digital footprint is a trail of data you create while using the
Internet. It includes the websites you visit, emails you send, and
information you submit to online services.
[spoof-ing] / noun
In the IT world, spoofing refers tricking or deceiving computer
systems or other computer users. This is typically done by
hiding one's identity or faking the identity of another user on
[in-ter-net pro-to-col add-ress] / noun
An IP address, or simply an "IP," is a unique address that
identifies a device on the Internet or a local network. It allows a
system to be recognized by other systems connected via the