Browse Definitions :

Is that network insecure or unsecure?

Writing for Business

Which is correct?
The bottom line seems to be that you can’t browse securely on an ________ network.
a. insecure
b. unsecure


Answer: a.

Explanation:
According to most sources, unsecure is not a word. Describing a network as insecure makes it sound like it needs assertiveness training but that’s the form to use. Here’s a snapshot of usage online:

Google poll:
unsecure network: 47,500 hits
insecure network: 53,400
non-secure network: 621,000

Non-secure is the clear winner, although it’s not really a widely-accepted term. However, these things aren’t decided by Google poll — at least not yet — so use insecure.

 Follow us on Twitter @tao_of_grammar

Dig Deeper on Writing for Business

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close