20 Cyber Security Terms You Should Know

NextGen Automation • May 27, 2022

Cyber Security 101: Basic Terminology You Should Know. 

There is no doubt that cyber security is becoming an increasingly important part of our daily lives. As our society shifts to a more digital era, many things are done digitally, such as online forms, banking, schooling, and remote work. Consequently, it is imperative that we protect our information and are familiar with different types of cyber security threats.


We understand that cybersecurity can be intimidating, especially if you aren't familiar with IT or security. Cyber security remains one of the hardest fields to understand and remain current with due to all the tools, technologies, methods, and attacks appearing.


Learn the basics of cyber security with these 20 key terms.


Let's dive in!


Antivirus – A software that scans a device or network to detect, block and remove security threats such as viruses, malware and ransomware.


Breach – A breach is when information is being accessed without authorization, often by a hacker. It results in unauthorized access to computer data, applications, networks or devices.  


Bot/Botnet – A network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker. Botnets can be used to steal data, send spam, perform DoS attacks, and allow the attacker to access the device and it’s connection.


Clickjacking – A hacking attack that tricks web users into clicking on an unintended link or button that is often disguised as a harmless element.


Cloud – Computing resources that allow you to access your files and services from anywhere in the world. This is made possible by a collection of computers with large storage capabilities that remotely serve requests.  


Data Loss Prevention (DLP) – Any security measures related to detecting and preventing data loss.


DDoS (Distributed Denial of Service) -  A form of cyber attack that involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic, rendering it unusable.


Encryption - A way of disguising data so that only authorized parties can understand that information. This is done to prevent theft by ensuring the data can only be accessed with a key.


Firewall – A defensive technology designed to prevent unauthorized access to a network. It inspects incoming and outgoing traffic. Firewalls can be hardware or software-based.


IP Address – An IP Address “Internet Protocol” is an address identifying the connection between a computer and its network provider.


Malware – An intrusive software specifically designed to disrupt, damage or gain unauthorized access to a computer system. Common forms of Malware can include: viruses, trojans, worms and ransomware.


Phishing – A technique used by hackers to acquire sensitive information, such as bank account numbers. This is often done by designing hand-crafted emails, tricking the user into believing its from a legitimate business or reputable source to reveal confidential personal and corporate information.  


Ransomware – A type of malware that deliberately prevents access to your data or computer system. It will encrypt these files – holding your information hostage until a ransom fee is paid to gain access to the decryption key.


Rootkit – A type of malware used by cybercriminals used to gain control over a computer or network. Rootkits often appear as a single piece of software but can be made up of a collection of tools that allow hackers administrator level control over the targeted device.


Social Engineering – A technique used to manipulate and deceive people into revealing sensitive or private information like passwords and banking information. Criminals impersonate themselves as someone trustworthy and use the seemingly legitimate pretext to make a user share data.


Spyware – A type of malware that monitors and spies on user activity without their knowledge or permission. It can steal sensitive information like bank details and passwords.


Trojan Horse – A type of malicious code that allows hackers to gain remote access and take control of your computer through a “back door”. It is designed to damage, disrupt, or steal from your data or network. Often these attacks are disguised in email attachments.


Virus –  A type of malware that can infect and harm a file, system or a network. The virus is usually attached to a harmlessly looking file or app, which to the user will appear to be valid and safe. Some viruses can replicate themselves.  


VPN (Virtual Private Network) – A service that protect your internet connection and privacy online. The VPN service creates an encrypted “tunnel” over the internet. This secures the data traveling between you and your destination.


Worm – A piece of malware that can replicate itself to spread from one infected device to other connected computers.


We've just scratched the surface in terms of cyber security, but that should get you started. Get the information and tools you need to protect your business now - knowledge is power! Subscribe to our mailing list below to receive future tips and advice from NextGen Automation


Newsletter Signup

Industry News

By NextGen Automation October 29, 2025
Scared of your office tech this spooky season? Discover how Nextgen Automation managed IT services keep your business safe and ghost-free.
By NextGen Automation October 1, 2025
NextGen Automation is pleased to announce that, as of September 18, 2025, it has acquired Gold Business Technologies, Gold Business Machines and Island Office Equipment. Gold, a well-established leader in office technology, has proudly served businesses across Western Canada for more than 40 years. Since 1984, Golds has built its reputation on integrity, innovation, and people-first service. As a trusted partner of Kyocera, Canon, and M-Files, Golds has helped organizations simplify their print environments, streamline document workflows, and adopt smarter digital solutions. Their focus on exceeding customer expectations and delivering reliable, long-term value has made them a cornerstone in the business community. This acquisition marks an important step in NextGen Automation’s growth across Western Canada. By combining the Gold Group of Companies legacy of service and expertise with NextGen’s expanding portfolio of Managed IT, Cybersecurity, Print, and Office Technology Solutions, we are creating a stronger partner for businesses that rely on technology every day. Clients of the Gold Group of Companies can expect a seamless transition with the same commitment to responsive service and trusted support they’ve always valued, now strengthened by the added expertise, infrastructure, and resources of NextGen Automation. “We’re proud to welcome the Gold Group of Companies to the NextGen family,” said Troy Schmeichel, President of NextGen Automation . “Their reputation for exceptional service and their commitment to doing right by their customers align perfectly with our own values. This partnership isn’t just about expanding reach, it’s about strengthening the promise we make to our clients: smarter solutions, better service, and people-first support.”
Show More