Services
Cybersecurity
About Jeff
IT Support
Basic IT Terms
100

The planning, design, implementation & support of an organization's IT systems.

What is IT Consulting?

100

A common type of malicious software.

What is a Virus?

100

Where he spent a few years in college, met his future wife and then moved on

What is SUNY New Paltz?

100

A common term for the initial contact point for technical assistance in a company.

What is a Help Desk?

100

A network cable that does not need hubs or switches for short distances.

What is Ethernet?

200

Keeping a copy of business data in a different location for safety.

What is Offsite Backup?

200

A technique used by attackers to trick employees into revealing sensitive information through deceptive emails.

What is Phishing?

200

His preferred type of alcohol

What is Whiskey?

200

When IT support fixes a problem for you online without visiting.

What is Remote Support?

200

The main circuit board of a computer, which holds the CPU, memory, and other components.

What is a Motherboard?

300

The practice of monitoring and managing computer systems and networks remotely.

What is Remote Monitoring and Management (RMM)?

300

This type of malware encrypts a victim's files, demanding payment to restore access.

What is Ransomware?

300

The amount of time he's been in business.

What is 22 years?

300

The process of tracking all hardware and software in an organization.

What is IT Asset Management?

300

The device you use to connect to the internet or local network.

What is a Router?

400

An IT support strategy where problems are fixed before users even know they exist.

What is Proactive Monitoring & Support?

400
A method that allows for texted or generated codes needed as well as a password.

Two Factor Authentication (2FA)

Multi-Factor Authentication (MFA)

400
Some of his favorite pastimes

What is Hiking / Cooking / Hosting?

400

An approach where IT services are provided and managed by an external company.

What is Outsourcing?

400

The brain of the computer where most calculations take place.

What is the CPU (Central Processing Unit)?

500

Managed service that involves monitoring and managing a company's network infrastructure.

What is Network Management?

500

This is what you call a simulated cyber attack used to evaluate the security of a system.

What is Penetration or 'Pen' Testing?

500

The amount of time he's been married to Tammy.

What is 21 years?

500

The strategy of having multiple support systems or personnel to ensure availability of IT support at all times.

What is Redundancy in IT Support?

500

A network security system that monitors and controls incoming and outgoing network traffic.

What is a Firewall?