Security Buzzwords Every Business Owner Needs to Know

Security Buzzwords Every Business Owner Needs to Know

Remember back in the good ol’ days of the Internet? Like about 20-years ago when it was just getting started? Most of it was full of simple little websites that didn’t have the same pizzazz at America Online. Everyone thought that AOL would be the model for the future.


In a way, it was. Even though we had to get on their home page through a screeching, crying modem that was so slow it would take minutes for a picture to fill our screens.

Such innocent times. We marveled at AOL’s news content, the ability to chat and the basic rudimentary stuff that the owner Steve Case had his programmers deliver to us. New acronyms appeared like LOL, BRB and LMAO.

Then the baddies started futzing around on the World Wide Web. It seems like there’s been one step forward and a half-step back as hackers, crackers and other mischief makers discovered what is now an essential part of our lives. Governments, virtually fighting other countries online, using evil code to break into our infrastructure, our financial institutions, The Pentagon and who knows what else.

Welcome to the Future


We’ve put together some of the spiteful things which can affect you, your business and nearly everything else hooked-up to the tubes. It’s a brief list. But these are matters that can cause either you or your IT Department to lose sleep over:

  • Hacktivism.
    There are malicious crowds of folks that are like LulzSec and Anonymous who are code monkeys using technology to get into your server and wreak havoc. While they explain they’re doing it for noble causes, that firewall protection you thought you had has just been blasted by a 21st century virtual cannonball.
  • Bring-Your-Own-Device (BYOD).
    What a nightmare. You’re employees start using their own Internet-enabled devices to do work under the roof of your business. Smart phones, tabletsĀ  and laptops. It’s a security matter simply because your IT Department has things under control for your computers. But once this variable comes into play, wave good-bye to web security.
  • Botnets.
    Botnets are vicious things that get on your network allowing a troublemaker to shovel-in all kinds of junk. It can cripple a small business from a remote location. Not just down the street, but in places like China or Russia. Botnets can fry your server, inject viruses and send out spam using your email addresses.
  • Defense-in-Depth.
    You need to develop such a policy. We would typically do this for you by employing security countermeasures. But you shouldn’t stop there. You need to purchase antivirus software for your internal network. Likewise, create security policies and configure your firewalls to prevent attacks. Regularly update the software. That part is free once you subscribe to it. And for those still running machines on anything less than Windows 7, Microsoft has all but stopped supporting older operating systems (OS). Wait on Windows 8. It’s more for those who are in a touch screen, mobile environment. With Windows 7, the boys and girls at M’soft will regularly update the OS when they find a security issue.
  • Click jacking.
    Hate this one. It’s a dribble of code that’s accidentally downloaded in the form of a script that sits on your browser. Basically, it collects and sends out everything you type on your computer. Where it turns sticky is when you hit the letters on your keyboard with sensitive information, the click jacker can read it. Nasty crackers and hackers can even take over your computer from afar.


  • Typosquatting.
    It seems innocuous but this is what it means. When a wrong-doer buys a website address that’s close to the same spelling as yours, hoping to capture a client and dump crap on their computer. An example might be to buy the Internet address “” It’s easy to mistype and hit the “x” key instead of the “z” key right next to it on the keyboard. There have been a few reports of the scofflaws making their fake site look just like the original place the customer wanted to go. Once they enter their username and password, BLAMMO! The schmucks go over to the real McCoy, login and order a bunch of stuff at your patron’s expense (especially if the client already has set-up credit card information that allows for “one-click purchasing”).

There’s a lot more the folks wearing black hats can do to your business. Be careful. If you’re looking for some company that swats these losers down like flies, talk to us. Your back. It’s covered.

Original Source:


Recent Posts

Start typing and press Enter to search