Wasp Barcode Technologies: The Barcode Solution People

7 Security Information Buzzwords Every SMB Owner Should Know


7 Security Information Buzzwords Every SMB Owner Should Know Today’s guest post is brought to us by Andy Stewart, Security Services Manager at Fusion Alliance. The world of technology is always evolving and as the technologies used by businesses evolve, so do the security treats and challenges surrounding that technology. With high profile attacks by hacker-activist groups, the increasing monetization of cyber attacks by organized crime and increase industry regulations, it’s sometimes hard to keep up with everything going on in information security. However, computer security affects any SMB with a website, online database or computer. For that reason, here are seven information security buzzwords every small business owner should know… 1. Cloud Security Cloud security is a component of computer security which deals with the policies, technologies, and controls put into place to protect data, applications, and the associated infrastructure of cloud computing. 2. Bring-Your-Own-Device (BYOD) Bring-Your-Own-Device is a term used to describe the phenomenon of employees using personal devices for work activities. This includes not only laptops, but smart phones and tables as well. BYOD often presents security problems for businesses, because the same measures used to secure company computers are often not taken to secure personal devices. 3. Botnets A botenet (also known as a Zombie Army or Command-and-Control channel) is a group of compromised Internet-connected computers that allows a person or entity to remotely issue commands. Botnets can be used for malicious activities including: spreading viruses, spending spam and using DoS attacks to crash servers. 4. Typosquatting Typosquatting occurs when a person or entity registers multiple domain names similar to a legitimate origination’s website, with the goal of tricking visitors who have mistyped that web address. In some cases, these sites are also designed to look very similar to the legitimate site. As a result, visitors may share information with the scam site without even realizing. 5. Clickjacking Clickjacking is a malicious script used to redirect Internet users to a destination other than what they see displayed or issue a command other than what they’ve intended. The danger of clickjacking is that it can cause users to reveal confidential information or even allow an outside entity to take over that computer. 6. Hacktivism Popularized by groups such as Anoymous and LulzSec, hacktivism is the act of using technology to gain unauthorized access to data in order to support a specific cause. 7. Defense-in-Depth Defense-in-depth is a term used to describe a series of security countermeasures that protect an organization’s information assets. Examples of security countermeasures include: security policies, firewalls and antivirus software. What security concerns are you facing in 2012? What measures have you taken to secure your company’s data?   About the Author: Andy Stewart heads the Security Services disciplines at Fusion Alliance, a company that specializes in technology-enabled business solutions. To learn more about Fusion Alliance, please visit: http://FusionAlliance.com