




- Security grammar: Are you insecure when writing about unsecure technology?
- Crowdfunding scientific research: Interview with Experiment
- Is the all or nothing crowdfunding approach a good thing, or seriously flawed?
- Crowdfunding Campaign PR: An Interview with Mitch Rosenberg, KinderLab Robotics
- New enrollment period now open: Launch your First Crowdfunding Campaign Success Blueprint Program
- Free online event: How to drive enterprise technology sales with PR
- Myth #10: Prompt’s ten technology sales myths
- Myth #9: Prompt’s ten technology sales myths
- Myth #8: Prompt’s ten technology sales myths
- 8945

- Ars Technica
- BBC News Technology
- BoingBoing
- Boston Globe Technology
- Business Insider Tech
- CNET
- Computer Weekly
- Crave
- Econsultancy
- Engadget
- GigaOm
- HuffPost Tech
- Lifehacker
- Mashable
- Mass High Tech TechFlash
- MIT Technology Review
- New Scientist Tech
- NY Times Technology
- SC Magazine UK
- SC Magazine US
- TechCrunch
- TechRadar
- TED Technology
- The Guardian Technology
- The Register
- VentureBeat
- Wired
- Wired UK
- ZDNet
- ZDNet UK

- March 2020
- May 2019
- May 2016
- March 2016
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- October 2011
- September 2011
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- May 2009
- April 2009
- March 2009
- February 2009
- January 2009
- December 2008
- November 2008
- October 2008
- September 2008
- August 2008
- July 2008
- June 2008
- May 2008
- April 2008
- March 2008
- February 2008
- January 2008
- December 2007
- November 2007
- October 2007
- September 2007
- August 2007
- July 2007
- June 2007
- May 2007
- April 2007
- March 2007
- February 2007
- January 2007
- December 2006
- November 2006
- October 2006
- September 2006
- August 2006
- July 2006
- June 2006
- May 2006
- April 2006
- March 2006
- February 2006
- January 2006
- December 2005
- November 2005
- October 2005
- September 2005
- August 2005
- July 2005

Archive for March, 2020
March 10th, 2020
Security grammar: Are you insecure when writing about unsecure technology?
Security grammar: Are you insecure when writing about unsecure technology?
At Prompt we spend a lot of our days writing about technology – big data, data warehousing, BI, CRM, BPM, ERP, API – you name it, we’re ITK. If it’s got an acronym, or a set of acronyms associated with it, then we’ve written opinion pieces, whitepapers, case studies and news releases about it.
One area that’s always hot – whether the underlying topic is mobile, cloud, BYOD, SQL injections, risk or compliance – is security. Which brings us to a very specific grammar question. Do you ever find yourself pausing and asking yourself, the people around, or the grammar gods: “Is it unsecure or insecure?”
At first, this appears a very easy question. ‘Unsecure’ can surely be eliminated – after all the word doesn’t appear in either Merriam-Webster or the Oxford English Dictionary. But that doesn’t necessarily mean a great deal in the constantly changing world of tech speak. In the technology sector, words and phrases are coined and adopted at the drop of a Zune – just consider the use of the words ‘virtualized’, ‘de-duplication’ or ‘phablets’. At Prompt we have to stay current with the market and all of its constantly ‘evolving’ terms and phrases (but we don’t have to like ‘em).
The problem with this example is that while insecure can be used in both US and UK English to mean something that is not adequately protected – for example an ‘insecure investment’ – it is more typically used to describe a lack of emotional confidence or certainty. Yes, some dictionaries will go as far to state the example of ‘an insecure computer system’ and there’s a whole Wikipedia page on ‘Computer Insecurity’, while ‘Computer Unsecurity’ clearly does not earn a Wikipedia page at all. But for many of us ‘insecure’ just doesn’t sit very, um, securely in a sentence.
We can’t help think that an insecure computer system sounds a little self-conscious about the size of its processors, or needs a reassuring reboot up the backend. So where to go?
Well, we like to use either of the phrases ‘non-secure’ or ‘unsecured’. Both pass dictionary scrutiny, and each can be used quite literally to mean ‘not made secure’, which we think is a good fit for a computer system that hasn’t been protected with security measures.
Unless you are an absolute stickler for academic grammar (and if you are then tech buzzwords are going to destroy your finely balanced sensibilities in about a picosecond anyway), then you could arguably use any of the terms mentioned in this post to get your point across. The most important thing then, as is generally the case with most copywriting best practices, is that you are consistent. So pick a term, add it to your company style-guide, share it with your team, marketing contacts and agency – and then be secure in your decision.
Posted in Prompt Grammar Tip, Technology | Comments Off on Security grammar: Are you insecure when writing about unsecure technology?