#

2FA

This is called double authentication.
It requires users to identify themselves in two stages to access the desired resource.

A

Advanced Threat Protection

Advanced Threat Prevention (ATP) scans for, analyzes and prevents malware attacks designed to bypass traditional security defenses.
The analysis pipeline assigns values to each step of the procedure and combines them to provide a more accurate conclusion.

Air gaps

This is a security precaution that consists of keeping a system physically protected from any computer network with the possibility of extracting or injecting data into a wired network.

Anti-malware

Antivirus software is a form of software used to prevent, detect and remove harmful software from computers and networks.
They can be installed on a computer, network gateway or dedicated device.

Active Directory

A kind of directory that lists all the information concerning a network (people, objects, servers, printers, etc….).

Vulnerability analysis

This analysis is used to identify security flaws in a system or application.

Ransomware attack

A program designed to obtain files, usually an e-mail asking the person to pay a ransom, so that the data obtained by the hacker can be returned.

Multi-factor authentication

This is a security system that uses several methods to verify the user’s identity.

B

Business Continuity Plan – BCP

It’s a recovery plan in case a company’s IT system suffers a crash.

C

Encrypting data

Encryption is the process of converting data so that only those with a secret key or password can understand it.
Data is encrypted with an encryption key, and decrypted with a decryption key.

CISO

Chief Information Security Officer is responsible for information security.
He plays an essential role in the application and success of the security program.

Preferred accounts

User accounts with privileged access are those with administrative rights on a system.
Privileged access, or “root” access, enables the user to modify system settings, install and uninstall programs, create and delete user accounts, etc.

Cloud-syncing

This service synchronizes documents from one computer to another via the cloud.

Cloud M365

Microsoft’s cloud solution, which provides access to the Office suite and other applications.
This solution also provides access to cloud computing services, device management and IT security.

Encryption

A process that secures data by making it unreadable to anyone who doesn’t possess the reading key.

D

DKIM

DKIM (DomainKeys Identified Mail) is a standard for verifying the domain name of the sender of an e-mail.
The veracity of the signing domain is checked, and the integrity of the message is ensured.

DMARC

DMARC (Domain-based Message Authentication Reporting and Conformance) is an e-mail validation system that detects and prevents identity theft.

Due Diligence

This is an approach that enables you to carry out an IT diagnosis of your company.

E

Endpoint Application Isolation & Containment

This is a zero-trust form of endpoint security.
Instead of detecting or reacting to threats, it applies controls that block and limit harmful actions to prevent compromise.

F

Firewall

A firewall is a network security device that monitors incoming and outgoing network traffic and uses a set of security rules to determine whether data packets can be allowed or denied.

G

Efficient patch management

Allows you to manage security and software installation issues.

I

ISO

The International Organization for Standardization (ISO) is an organization that sets internationally recognized standards.

IT

The use of computers, storage, networks and devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data is known as information technology (IT).

Lateral movement intrusions

This is a network intrusion technique used by hackers.
They do this by moving inside a network, attempting to retrieve sensitive data.

L

LPD

The Federal Data Protection Act came into force on July 1, 1993, just like the RGPD, aims to protect individuals’ data.
Under the new rules, all Swiss companies will be required to comply.

M

MFA

This is an authentication approach that requires the user to provide multiple verification factors (at least two) in order to access a resource (such as an application, online account or virtual private network).

O

OT

Operational Technology refers to the operating technology that handles industrial information systems.
OT is usually included in the term SII (Système d’Information et d’Intervention).

On premise

Means “on-premise”, software that has been installed on a computer on the company’s premises.
It’s the opposite of cloud software.

Organization and governance

Governance enables the organization to put a plan in place so that they can achieve their objectives.

P

Payment Card Industry – PCI

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store or transmit credit card information maintain a secure environment.

PAM

Privileged Account Management, Whether accidental or intentional, privileged access abuse is a huge problem in organizations.
PAM solutions protect your organization from such abuse by guarding against both accidental and deliberate abuse.
As an organization grows, this protection becomes increasingly important.

Patching

Updates software to make it compatible with other hardware and systems.

Cyber incident response plans

This is a computer security breach plan that ensures measures are put in place to neutralize the threat.

R

RGDP

“General Data Protection Regulation” is the name of the regulation that aims to protect the privacy of individuals’ data.
The GDPR, or “General Data Protection Regulation”, is a European Union law that regulates the processing of personal data.
The legal environment is evolving to adapt to advances in technology and society (such as the growing use of digital technology, online commerce, etc.).
It unifies Europe’s rules, offering professionals a single legal framework.
It establishes user confidence in their digital activities across the EU.

S

Sandbox

It’s a test environment in a computer system in which new or untested software or coding can be safely executed.

SPF

The Sender Policy Framework (SPF) is a standard for verifying the domain name of the sender of an e-mail, established in RFC 7208 (section 3.1).
This standard is intended to reduce spam.

SIEM

Security Information and Event Management is a solution that provides an overview of security events or incidents that occur in a computer network.

SOC

Security Operations Center, is a department within a company in charge of IT security.

Solarwinds ORION

It’s a platform for managing and monitoring a company’s IT infrastructure.

Appropriate network segmentation

This involves dividing a network into several segments, which act as mini-networks.

T

Penetration testing

A test to assess the security of a company’s IT network system.

V

VPN

A VPN (Virtual Private Network) is a system that allows you to surf the Internet anonymously.