IT & Computer Consultant | Computer Security Service | Web Design in San Francisco Bay Area


VPN (Virtual Private Network) - Is an encrypted connection that allows you to share data and surf the internet safely and securely.

Virus/Malware – Malicious code or software that is designed to disrupt, damage, and/or gain unauthorized access to a system. Viruses, trojans, worms, spyware, and ransomware are all different types of malware.

Encryption – Is a reversible algorithm that take takes human readable data and converts it to nonreadable jumbled computer code. Symmetric encryption uses the same key to encrypt and decrypt, whereas Asymmetric encryption uses one key public key to encrypt and one private key to decrypt.

The Cloud – Servers located around the world that you can access from anywhere via the Internet. Microsoft Office 365, Dropbox, Gmail, and many others are all examples of cloud-based servers.

Phishing – Is a technique to acquire personal information such as username, password, social security number and/or credit card information from a user through a fraudulent solicitation email or web site.

Dark Web – A part of the Internet where illegal (or secret) activities take place. Not searchable by Google. Requires a special browser to access.

Firewall – A hardware device or software application that monitors, inspects, blocks, and allows inbound and outbound traffic from the Internet. Usually has to be purchased separately.

Router – A device that sends packets of data to devices that are on different networks. A router routes data based on the destination IP Address. This is usually what you get from your Internet provider.

HTTP vs HTTPS –For web sites, if you see HTTP before the www, that means the web site is sending information in plaintext, which is readable by any hacker who inspects the traffic. The S in HTTPS stands for “secure”. HTTPS encrypts the information before sending it. Hackers cannot read it. Make sure any web site you visit has the S at the end.

Whitelist vs Blacklist – Whitelisting is the practice of blocking all entities/services except for those that are explicitly allowed to communicate with your network/system. Blacklisting means allowing most entities/services and excluding the ones defined as malicious by your organizations security policies.

HIPAA – Health Insurance Portability Accountability Act
If YOUR business interacts with any medical office where your employees may be using or disclosing patient health information you must be “HIPAA Compliant.”

PCI – Payment Card Industry Compliance
Requirements by credit card provider industry that specifies what your business must do in order to ensure the security of YOU processing credit card payments.

Internet of Things (IoT) - IoT devices include smart thermostats, smart watches, medical sensors, fitness trackers, and smart security systems that connect to the Internet. In effect, if it’s not computer-related, it’s a “thing.”

Password Manager – Is a software program that stores and manages online passwords in an encrypted database. A password manager can prompt a user if a password is being reused across sites and aid in the creation of complex passwords. It is considered best practice to have a unique password for each credential in use.

Metaverse – A simulated digital environment that integrates augmented and virtual reality combined with gaming and social media to create a unique rich user interaction mimicking the real world.