{"id":2595,"date":"2023-02-04T20:55:33","date_gmt":"2023-02-05T04:55:33","guid":{"rendered":"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/"},"modified":"2023-02-15T13:26:36","modified_gmt":"2023-02-15T21:26:36","slug":"glossary","status":"publish","type":"page","link":"https:\/\/tekedgeconsulting.com\/beta1\/teksupport\/glossary\/","title":{"rendered":"Tech Lingo"},"content":{"rendered":"<p>You deserve to have your questions answered in plain English. Our technicians will clearly explain what is happening so you understand. We do our best, to not sound like <a href=\"http:\/\/#ppsShowPopUp_103\">THIS!<\/a><br \/>\n<div class=\"cm-glossary table modern\"><div class=\"glossary-container \"><input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"glossary_index_style\" value=\"modern-table\">\t\t<div class=\"progress-indicator\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/tekedgeconsulting.com\/beta1\/wp-content\/plugins\/TooltipProPlus\/assets\/css\/images\/ajax-loader.gif\" alt=\"AJAX progress indicator\"\/>\r\n\t\t<\/div>\r\n\t\t<div class=\"glossary_top_filter\">\r\n\t\t\t<div class=\"left\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"disable_listnav\"\r\n\t\t       value=\"0\"\/>\r\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"exact_search\"\r\n\t\t       value=\"0\"\/>\r\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"show_search\"\r\n\t\t       value=\"0\"\/>\r\n\t\t<input type=\"hidden\" class=\"glossary-hide-terms\" name=\"glossary-hide-terms\"\r\n\t\t       value=\"0\"\/>\r\n\t\t<input type=\"hidden\" class=\"glossary-hide-categories\" name=\"glossary-hide-categories\"\r\n\t\t       value=\"1\"\/>\r\n\t\t<input type=\"hidden\" class=\"glossary-hide-abbrevs\" name=\"glossary-hide-abbrevs\"\r\n\t\t       value=\"0\"\/>\r\n\t\t<input type=\"hidden\" class=\"glossary-hide-synonyms\" name=\"glossary-hide-synonyms\"\r\n\t\t       value=\"0\"\/>\r\n\t\t<input type=\"hidden\" class=\"glossary-perpage\" name=\"glossary-perpage\"\r\n\t\t       value=\"0\"\/>\r\n\t\t<input type=\"hidden\" name=\"tooltip_language\"\r\n\t\t       value=\"\"\/>\r\n\t\t<input type=\"hidden\" name=\"language_dropdown\"\r\n\t\t       value=\"\"\/>\r\n\t\t<input type=\"hidden\" name=\"languages_for_table\"\r\n\t\t       value=\"\"\/>\r\n\t\t<div id=\"glossaryList-nav\" class=\"listNav large\" role=\"tablist\"><\/div><ul class=\"glossaryList\" role=\"tablist\" id=\"glossaryList\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTermSet\"><li class=\"the-index-letter\"><h3 role=\"tab\">b<\/h3><\/li><li class=\"ln-1\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/brute-force-attack\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Passwords\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Brute Force Attack<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >A brute force attack is a type of malicious attack that can be used to gain access to a system or network. It involves an attacker attempting to guess a password, PIN or other authentication credentials by trying every possible combination until the correct one is found. This type of attack(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/brute-force-attack\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"the-letter-separator\"><\/li><li class=\"the-index-letter\"><h3 role=\"tab\">d<\/h3><\/li><li class=\"ln-3\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/data-breach\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Cyber Crime\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Data Breach<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >A data breach occurs when sensitive or confidential information is accessed, stolen, or exposed by an unauthorized entity. This can happen due to a variety of reasons, such as hacking, phishing, or human error. The consequences of a data breach can be severe and far-reaching, including(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/data-breach\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"ln-3\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/dictionary-attack\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Passwords\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Dictionary Attack<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >\r\nA dictionary attack is a systematic method of guessing a password by trying many common words and their simple variations. Attackers use extensive lists of the\u00a0most commonly used passwords, popular pet names, fictional characters, or literally just words from a dictionary \u2013 hence the name of(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/dictionary-attack\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"the-letter-separator\"><\/li><li class=\"the-index-letter\"><h3 role=\"tab\">e<\/h3><\/li><li class=\"ln-4\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/encryption\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Encryption<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >Encryption is the process of encoding information so that it is only readable by those who have the key. It is a powerful tool used to protect sensitive data, such as financial information and personal data, from being accessed by unauthorized individuals. It is also used to ensure the(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/encryption\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"the-letter-separator\"><\/li><li class=\"the-index-letter\"><h3 role=\"tab\">o<\/h3><\/li><li class=\"ln-14\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/one-time-password\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Passwords\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">One-Time Password<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >A one-time password, also known as an OTP, is a type of authentication that requires a user to enter a unique string of numbers or characters each time they attempt to log in. This type of authentication is designed to provide an extra layer of security to user accounts by preventing(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/one-time-password\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"the-letter-separator\"><\/li><li class=\"the-index-letter\"><h3 role=\"tab\">p<\/h3><\/li><li class=\"ln-15\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/passphrase\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Passwords\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Passphrase<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >TLDR The most important factor in password strength is length. Passphrases are a string of words, like a favorite song lyric or quote. These can be both long and easy to remember! Aim to create a passphrase that is 16 characters or more. Use a mix of alphabetical and numeric, a mixture of(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/passphrase\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"ln-15\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/password-manager\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Passwords\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Password Manager<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >A password manager is software that helps users manage and store their passwords securely. With the increasing number of online accounts, it has become challenging to remember unique passwords for each account. Password managers solve this problem by generating and storing strong, unique(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/password-manager\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"ln-15\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/phishing\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Email cmtt_Scam\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Phishing<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >Phishing is an increasingly common form of cyberattack used to gain access to sensitive information, such as passwords and financial information. It involves attackers sending out malicious emails that appear to come from a legitimate source, such as a bank. The emails will often include a(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/phishing\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"ln-15\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/pwned\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Passwords\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Pwned<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >The term \"pwned\" is a slang term used to describe when someone has been hacked, defeated, or taken advantage of in some way. It is derived from the word \"owned\" and is commonly used in online gaming and on the Internet as a whole. It is a way of acknowledging that someone has been outwitted or(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/pwned\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"the-letter-separator\"><\/li><li class=\"the-index-letter\"><h3 role=\"tab\">r<\/h3><\/li><li class=\"ln-17\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/ransomware\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Scam cmtt_Cyber Crime\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Ransomware<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >Ransomware is a type of malicious software that can take control of a user's computer and encrypt files, making them inaccessible until a ransom is paid. Ransomware is typically spread through malicious email attachments, malicious websites, and unpatched software vulnerabilities. While(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/ransomware\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"the-letter-separator\"><\/li><li class=\"the-index-letter\"><h3 role=\"tab\">s<\/h3><\/li><li class=\"ln-18\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/social-engineering\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Cyber Crime\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Social Engineering<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >Social engineering is the practice of manipulating people into performing actions or divulging confidential information. It is a type of fraud that relies on human interaction and involves exploiting the natural tendency of people to trust each other. Social engineering techniques are used to(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/social-engineering\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"ln-18\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/strong-password\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Passwords\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Strong Password<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >Strong\/Secure passwords are important for our online security. They should be complex and long, with at least 8 characters and a mix of upper and lower case letters, numbers, and symbols. Avoid using personal information such as birthdates, names, or pet names. It is also important to use(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/strong-password\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><li class=\"the-letter-separator\"><\/li><li class=\"the-index-letter\"><h3 role=\"tab\">t<\/h3><\/li><li class=\"ln-19\"  itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\" ><a href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/two-factor-authentication\/\"  role=\"term\" class=\"glossaryLink glossary-link-title  cmtt_Security cmtt_Passwords\"   style=\"\"   itemprop=\"url\" ><span itemprop=\"name\">Two-Factor Authentication<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\"  itemprop=\"description\" >Two-Factor Authentication (2FA) is an important tool for protecting sensitive data. It is a security measure that requires two different authentication factors (methods) in order to access an account. The first factor is typically something the user knows, such as a password, and the second(...) <a class=\"glossary-read-more-link\" href=\"https:\/\/tekedgeconsulting.com\/beta1\/glossary\/two-factor-authentication\/\"  style=\"\" >Read More<\/a><\/dfn><\/li><\/ul><\/div><div class=\"clear clearfix cmtt-clearfix\"><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>You deserve to have your questions answered in plain English. Our technicians will clearly explain what is happening so you understand. We do our best, to not sound like THIS!<\/p>\n","protected":false},"author":1,"featured_media":2749,"parent":2249,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"cybocfi_hide_featured_image":"","footnotes":""},"folder":[103],"class_list":["post-2595","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/pages\/2595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/comments?post=2595"}],"version-history":[{"count":5,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/pages\/2595\/revisions"}],"predecessor-version":[{"id":3851,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/pages\/2595\/revisions\/3851"}],"up":[{"embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/pages\/2249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/media\/2749"}],"wp:attachment":[{"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/media?parent=2595"}],"wp:term":[{"taxonomy":"folder","embeddable":true,"href":"https:\/\/tekedgeconsulting.com\/beta1\/wp-json\/wp\/v2\/folder?post=2595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}