The term ‘data security’ brings to mind a vast number of data solutions that aid the responsible handling of data, but it is equally associated with some famous data handling failures.
As a leading security print company, we have witnessed first-hand the impact of improper data security and the risks associated with unsuitable data security strategies.
As online environments continue to expand, cyber security continues to rise on the agenda of the UK government (something you can read more about in our recent article ‘How the new Data Reform Bill could boost British businesses and better protect data’) but despite this growth, the importance of personal data protection goes beyond digital environments and also plays a vital part in security print processes.
While there are hundreds of abbreviations for some of the terms associated with data security, we’ve collated a jargon buster for some of the most significant data security terms in both the digital and print security industries:
- Domain: A group of technology devices that are connected and governed by the same set of rules to ensure there are no security breaches (this is often implemented in workplaces).
- Protocols: A set of agreed rules for the sharing of data in which the guidelines must be met for the transmission of data to be successful. This also covers what is known as an SFTP (Secure File Transfer Protocol).
- Firmware: This is built-in software that manages the functionality of your printers. While it does need to be regularly updated to avoid glitches, this will also help to maintain security protection.
- Encryption: This means that the data is made secure using mathematical techniques that scramble the data to the point it is unidentifiable. Using an encryption algorithm, data is converted into something called ‘ciphertext’ that can only be decoded with a unique decryption key. This technique is vital to the protection of data and maintaining data integrity, ensuring private data is safe from unauthorised access and unwanted modification.
- Data controller: A person, company, or independent body that decides the purposes and methods of processing personal data.
- Data processor: A person, company, or independent body working with a data controller to process personal data on their behalf.
- Breach: A breach takes place when a vulnerability is exploited in a computer device enabling unauthorised access to files and networks.
- Firewall: Hardware or software-based systems that are designed to strengthen defensive technology and prevent hackers from infiltrating networks and accessing unauthorised information.
- Pen test: Short for ‘penetration test’, this is an authorised test of a computer network or system that is designed to search out security vulnerabilities so that they can be fixed or strengthened (using an ‘ethical hacker’ to try to infiltrate a network, website, or software).
- Password: A secret string of characters that should only be known by one person and can therefore be used to authenticate access to devices, accounts, and various software.
- Authentication: The process in which an individual user, system, or entity is positively identified by another, typically based on something they know (e. g. a password) and sometimes something they have (e. g. a security token) or something they are (biometrics).
- Multifactor authentication: This is a form of user authentication that requires various types of credential approval for access (e.g. a secret password plus a security token plus a biometric).
- Pull print: This is a secure printing solution on a smaller scale. Users can enter a code or RFID card to authorise a document being printed. While it does not allow for complex printing on the scale that we achieve here at Zunoma, this solution is particularly beneficial for the printing of secure documents in group settings and reduces data sharing with unauthorised parties.
- IP address: This is an online version (device-specific) of a home address or fingerprint. An identifiable and traceable code that is attached to actions made on a device via the internet.
- IP whitelisting: As an example, if Zunoma’s networks were being attacked we could block or ‘whitelist’ the IP address of the attacker, which would ensure our Firewall and other data protection software would be alerted to ignore all requests from the said IP address.
As a trusted partner of financial institutions, local governments, and education providers worldwide, our innovative data security solutions enable people and businesses to participate in the global marketplace with confidence.