The world of IT is already confusing enough, but all the extra abbreviations and terminology doesn’t make things any easier. We’ve broken down some of the main terms used when referring to Cyber security to help you break down some of the jargon you might hear. If there’s anything you’re still unsure of regarding cyber security, give the Rejuvenate IT experts a call on 01202 237 273 and we’ll be happy to help. 


Malware is a general term used to describe all types of software designed to harm your computer, including viruses and ransomware.

Identity theft

You've probably heard of 'identity theft' before. This is the act of someone pretending to be you in order to gain access to secure information such as bank accounts, social media profiles, or apply for credit in your name.


Phishing is usually related to e-mail scams, baiting you into clicking links or downloading attachments by pretending to be from a legitimate source. Clicking links from phishing emails will usually install malware onto your device without you even knowing!


Also known as 'CEO Fraud'. Whaling is an advanced cyber-attack where a criminal will research and pose as a senior member of the company you work for, they target employees and send out communication that looks as though it has come directly from the senior member of staff, meaning you're more likely to click on the links that download malware.

Email bombing

Email bombing is when a cyber attacker will send a large volume of spam emails to a specific address, resulting in the victim's email server crashing. Opening any links in the emails sent may also result in malware.


Hacking is the act of someone intruding and accessing a computer system without permission. Hackers usually have experience in a particular set of software and know the specific security flaws that they can exploit for personal gain.

Trojan Horse

Similar to the old Greek method of hiding something dangerous within something that seems harmless. Trojan horses are pieces of software that appear legit and harmless but contain bits of code designed to gather information and data from the user without them knowing.


Ransomware is a form of Malware as we've previously mentioned, but this specific type of software is designed to prevent you from accessing your files/folders. Holding them 'ransom'. Hackers typically ask for a payment from you before they release the files back to you.

Need help protecting your business from cyber attacks like the ones mentioned in this article? Get in touch with Rejuvenate IT today to find out how we can help protect your valuable assets from hackers and malware. 

Have questions about the new 365 pricing?

We’re on hand to answer any questions you might have about the new pricing structure or NCE for Microsoft 365. You can get in touch by calling us on 01202 237 273 or completing a contact form using the link below.