Internet Lingo 101 – A Cheat Sheet for Beginners

Internet Terminology 101The Internet is growing and changing so fast that even the dictionary has trouble keeping up. Here are some common terms that are helpful to know.

Browser
A browser is a software program that lets you view web pages, videos and other online content. It’s a core requirement of going online, as it converts the computer languages HTML, Javascript and XML into a readable form.

Popular browsers are Google Chrome, Safari, Firefox and Microsoft Edge – Internet Explorer has been superseded by Edge and due to security issues is no longer recommended.

Email
Electronic mail (aka email or e-mail) is a typed message sent from one person/business to another via the Internet. Email is usually delivered to the recipient quite quickly (sometimes in seconds) but can take up to a few hours or longer.

To read and write email you will need a program such as MS Outlook or access to an email service such as Gmail or Outlook.com (usually through a browser).  Most emails are in the form of letters, newsletters or catalogs and are often written with a more casual tone. Email can include text, links to the internet and images but can only include video and sound as an attachment.

Firewall
A firewall is a security measure designed to act like a bouncer to your network. It can be both a hardware or software device. When an unauthorized user attempts to gain entry, the firewall blocks their path and refuses their access.

HTTP and HTTPS
These are acronyms for the rules of how data is transmitted across the Internet. The actual mechanics are incredibly complicated, but the terms have one very important distinction – the s on the end.

HyperText Transfer Protocol (HTTP) describes how the images, text and links ion a webpage are transferred across the Internet.

HyperText Transfer Protocol Secured (HTTPS) means the page has an added layer of security to hide your personal information from hackers. Data sent through pages with this prefix are securely encrypted before transmission.

IP Address
Every device directly connected to the Internet is assigned a unique IP address to identify itself. It is used to make sure that when you request a page or document it is sent back to you. Your IP will look something like ‘202.9.64.55’ and may be referred to as fixed or dynamic IP address.

ISP
Your Internet Service Provider (ISP) is the company that allows you to connect to the Internet. You usually connect to them through a hardware device such as a modem or router. They can also offer extra services like email or web hosting.

Malware
Malware is the short form of the phrase malicious software. It is a broad term used to describe viruses and other software that performs a function that you don’t know about. Malware can trick you into paying money, take control of your computer, be used to launch attacks against other computers, steal your private details or break your computer in some way. Instead of listing each specific threat separately you’ll commonly see them lumped together under the general term ‘malware’.

Router
The traffic system for your network the connects computers and devices within your office or home and acts as a basic defensive gateway to the Internet. These hardware devices can be wired or wireless and allow you to share one Internet connection amongst all the computers and devices in your office or home.

Social Media
A term to widely describe all the websites and applications that let you share and interact with others online. To fit this term the site needs to allow user profiles, live updates and the ability to add friends and / or followers.

The most common social media websites are Facebook and Twitter.

Spam and Filtering
Spam refers to any unsolicited email message sent over the Internet. It is the electronic form of junk mail but is also a technique hackers use to trick people into clicking links which may infect their computer with malware.

Email applications are reasonably good at identifying spam and should shift dodgy messages automatically to a spam folder before you see it. Occasionally the filters get things wrong and you may find a relevant email needs to be dragged back to your inbox from the spam folder or allowed through. Filters should also allow for blacklisting and whitelisting email addresses.

URL
Each website has a unique address on the web known as a URL (Uniform Resource Locator). URLs commonly end in .com but can also end in a country specific extension like .com.au or .fr, or more recently, in new and exciting extensions such as .xyz or .me

Let me know below in the comments if you have any other words or want a description for a word or phrase you don’t understand.

 

Top Ten Tips To Stay Safe Online

Are you worried about staying safe while using the Internet?

Then check out our great tips on how to stay online by clicking the link below.

The articles go through the following topics:

  • Secure you device.
  • Shop safely with trusted sellers
  • Learn the markers of a secure site.
  • Use a safe and protective payment method
  • Think before you share
  • How to tighten privacy settings
  • What to use a a passphrase
  • How to check the senders email address
  • Check the URL.
  • How to outsmart fishing attempts..

Click the link below to access our easy to print PDF with the tips.

Top 10 Tips to Stay Safe Online Guide

If you have any questions please leave a comment below.

Why You Should Not Use A Free Email Address For Business

Free email accounts indicated a lack of experience

Many businesses, clients and customers communicate primarily by email and as you know it provides a fantastic ROI – unless you’re using a free email address (like Hotmail, Gmail or one provided by your ISP (internet provider)). If you are still using a free email address you are most likely losing business each and every day.

The downsides of using a free email address are:

An unprofessional look: Imagine if your bank used a free email account – you’d never feel comfortable giving them your personal details let alone your money. How people perceive your business is what can make or break a business. Without a professional touch you will appear as a fly-by-night enterprise. It puts your credibility into question and sends the message that you’re not serious about doing business – or worse – that you are prepared to cut corners and take the cheap option.

It erases your experience: A new or fledgling business often starts out with a free email account. This clearly communicates that they are new, have little experience and are perhaps testing the waters in a new direction. They’re not even remotely proven yet and are firmly within the hobby-zone. Continuing to use the free address once your business moves into the professional arena means you will struggle to build momentum and any experience you have earned will be negated.

It’s forgettable or inappropriate: Your business success hinges on being memorable enough to gain repeat custom and referrals from advertising. Unfortunately free email addresses are filled with hard to remember clutter, for example – franksplumbing_1975@hotmail.com or bookkeeper1198@gmail.com.

Neither of these roll off the tongue, are appropriate for business, or can be remembered without a high likelihood of typos and bounce backs. Branded email addresses such as frank@franksplumbing.com make running a profitable and scalable business much easier.

The email address Is not permanent or safe: When you have a free email address you are at the mercy of the provider. They may cancel your account for any reason or even cease operations. These free accounts are also often hacked and their passwords leaked on a global scale. You get stuck using the same provider (and can’t take advantage of any better deals) as you need to use the old email address because it is on your marketing materials (printed on your business cards, car lettering, flyers etc).

With your own domain name and subsequently your own email address you own it and can move it to a new business-grade email service easily. You also have complete control over the domain and can reset passwords and create and close accounts at will.

Give us a call at 08 8326 4364 to set up your branded business email.

Will Clicking That Link Cost You Thousands?

Ransomware has been a huge security threat in 2016. No-one was safe. Hackers targeted everyone and everything – including office networks and home PCs. In fact anything connected to the Internet (including smart TV’s and surveillance cameras) was fair game for them. They were very successful, with reports of upwards of $US846million reported just from incidents in the US. With this sort of monetary gain business is booming for hackers, with thousands of attacks each day bringing in an average of $US640 per target. Even more alarmingly is that the cost to the end user is on the rise with hackers demanding more and more money each time.

Some hackers even offer to help and rescue you from the issue that they caused – for a fee of course! One method is to trick you into thinking you have a virus or malware issue that will spread rapidly if you don’t pay them money to remove it. Another scarier method is that they pretend to be from a law enforcement agency (ie the Federal Police, FBI or a similar type of organisation) and say your computer was involved in a crime (anything from money laundering to child pornography). If you pay them a certain amount of money quickly you can avoid going to prison.

The real bad malware that is spreading rapidly at the moment are the crypto range of viruses. These viruses cause users to be locked out of their own data by encrypting files on users computers and servers. Folders of business documents, pictures, photos, music and even financial records are all held hostage until a ransom is paid. The encryption is such that it is unbreakable and unless you have a good backup paying the ransom is often seen to be the only solution.

The way these evil hackers get into your computer is deviously simple. They convince users to click on an email attachment/link or pop-up. For example you receive an email or pop up that:

  • supposedly tracks an undeliverable package.
  • is a bill or credit from a utility company.
  • alerts you to a virus that was found and needs to be removed.
  • an invoice from a company you have never heard of and / or for goods you never ordered.
  • advises you of a recent traffic or some other type of fine.

They make the message so tempting to click through for more details (this is what the hackers count on). Their messages and pop-ups aren’t obvious threats and so can easily slip under our radar and through various spam and virus filters.

Paying the hackers to solve or unencrypt your files is not recommended as they are not the most trustworthy bunch. That one payment may lead to demands of more and more money with no solution in sight.

To make things worse, the malware can encrypt your backups too. Having a backup is very important in any situation, but in cases like this, the right backup is needed – with several other backup copies not connected to your network and stored safely offsite. An online backup is also recommended. Before restoring your backup remember to check that the malware isn’t lurking in the background, ready to not just re-infect your restored files but also the backup drive itself.

To avoid finding yourself dealing with ransom demands we recommend being wary of all email attachments. Even if they are from business associates, friends and family – if you are not sure what the file is don’t click it. The sender may not have sent that email intentionally and their compromised system may be automatically emailing everyone in their address book.

You should also be wary with any popups that appear out of place, especially ones that try to make you panic or do something you are wary of doing. If the message doesn’t sound or look right then don’t click it. Ransomware is just too dangerous to risk.

Also make sure your backups are working correctly and regularly test your backups.

Call us on 08 8326 4364 to set your computer up with protections against ransomware / malware / viruses, and put backups in place that will keep your important files safe.

How To Stay Safe While Being Social Online

How do you balance being social with staying safe online??

These days it is common for people to happily share all sorts of their private information online. Unknown to the actual users this sharing builds information stores that can easily become a one-stop goldmine for fraudsters.
Staying Safe Online

It’s not exactly the intention everyone has when they sign up to a social network site (as the whole point of most of their networks is to share your life with your friends) but this social sharing depends on us making certain privacy sacrifices.

So how do you balance being social with staying safe?

On Facebook alone, the average person shares 13 pieces of personal information ranging from a fairly innocent name/email combo, all the way to their mothers maiden name and home address.

It doesn’t sound like a lot, but those 13 pieces have the power to unravel your life within minutes.

Even checking in at home has become the norm for some people, helping to create a multi-dimensional online identity. The details are available to anyone who cares to look, whether they’re a friend keeping in the loop or someone with a much darker agenda.

The problem is that you don’t know who’s looking at your profile or why they are looking.

For example, someone could try accessing your email account by clicking the ‘Forgot password’ link. The email service follows its security rules and asks identifying questions like ‘which high school did you go to? What is your pet’s name?’ These most common identifying checks and their answers are probably available on a lot of peoples Facebook page.

Once your email address is compromised, hackers can use that to break into other services by going through, clicking ‘Reset Password’ on site after site, account after account – since they have full access to your email. So there’s nothing stopping them from compromising all your online accounts.

7 Ways To Secure Your Facebook Without Missing Out on the Fun

  • Preview your profile as others see it (ie see if you can login on a friends account to see what they can see).
  • Review what should and should not be visible to strangers.
  • Consider only sharing partial details, like birth day and month, but not the year.
  • Only ever ‘friend’ or ‘connect’ to people you know and trust.
  • Be wary of duplicate or ‘odd’ friend activity – hackers will often clone or hack a friend’s profile and initiate an urgent and uncharacteristic request (usually for money).
  • Update your past privacy settings too.
  • Set default future sharing to ‘friends only’.

Need help securing your social media privacy? We can help– contact us today on 08 8326 4364 or via email at support@dpcomputing.com.au.