Resources

Tech Terms

Whether you are a business owner with limited technical experience or a seasoned technology leader, we are here to help. We understand that IT is filled with acronyms and jargon that can be overwhelming. These terms and definitions are designed to make the technology landscape easier to understand and help you feel more confident navigating it.

IT Terms

Access Control

The methods used to determine who can access systems, data, or resources and what actions they can perform.

Access Point (AP)

A device that allows wireless devices to connect to a wired network.

Active Directory

A Microsoft directory service used to manage users, devices, permissions, and policies.

ActiveX

A Microsoft technology that enables interactive content and functionality within applications and browsers.

Antivirus

Software designed to detect, prevent, and remove malicious software.

API

An Application Programming Interface allows different software systems to communicate and share data.

Audit Logging

The recording of system activity to support security monitoring and compliance requirements.

Backup

A copy of data stored separately to protect against loss or corruption.

Back-End

The server-side components of an application that handle data processing and storage.

Bandwidth

The maximum amount of data that can be transmitted over a network connection in a given time.

Business Continuity & Disaster Recovery (BCDR)

A strategy that ensures critical business operations continue and data can be quickly restored during and after disruptions such as cyberattacks, system failures, or natural disasters.

Cloud Computing

The delivery of computing services such as servers, storage, and applications over the internet.

Compliance

Meeting regulatory, legal, and industry standards for data protection and IT operations.

CPU

The Central Processing Unit performs calculations and executes instructions for a computer.

Credential

Information such as a username, password, or certificate used to verify identity.

Dark Web

A hidden part of the internet accessible through specialized software where illicit data and activities are commonly traded.

Data Backup

The process of copying data to a secure location for recovery purposes.

Data Center

A facility that houses servers, networking equipment, and storage systems.

Data Retention

Policies that define how long data must be stored and when it can be securely deleted.

DDoS

A Distributed Denial of Service attack overwhelms systems with traffic to disrupt availability.

Domain Name

A human-readable website address that maps to an IP address.

DNS

The Domain Name System translates domain names into IP addresses.

EDR (Endpoint Detection & Response)

A cybersecurity solution that continuously monitors endpoints to detect, investigate, and respond to threats.

Email Filtration

The process of scanning and filtering email messages to block spam, phishing, and malicious content.

Endpoint

Any device connected to a network, such as a computer, phone, or tablet.

Encryption

The process of converting data into a secure format to prevent unauthorized access.

Ethernet

A wired networking technology commonly used in local networks.

ePHI

Electronic Protected Health Information stored or transmitted in digital form.

Firewall

A security system that monitors and filters network traffic based on rules.

Firmware

Embedded software that controls the basic functions of hardware devices.

Failover

The automatic switching to a backup system when a primary system fails.

Gateway

A device that connects and routes traffic between different networks.

GPU

A Graphics Processing Unit accelerates graphics rendering and parallel processing tasks.

Group Policy

A Windows feature that enforces configuration and security settings across devices.

Hardware

The physical components of a computer or IT system.

HDD (Hard Disk Drive)

A traditional storage device that uses spinning disks to store and retrieve data.

Help Desk

A support service that assists users with IT issues and requests.

HIPAA

A U.S. regulation governing the protection of patient health information.

High Availability

System design that minimizes downtime through redundancy and failover.

HL7

A healthcare standard for exchanging clinical and administrative data between systems.

Hypervisor

Software that creates and manages virtual machines.

Incident Response

A structured approach to identifying, managing, and resolving security incidents.

Infrastructure

The combined hardware, software, and networks supporting IT operations.

Intrusion Detection

Monitoring systems for signs of unauthorized or malicious activity.

IP Address

A unique numerical identifier assigned to a device on a network.

ITDR (Identity Threat Detection and Response)

Security technology that detects and responds to attacks targeting user identities, credentials, and access systems.

JSON (JavaScript Object Notation)

 A lightweight data format used to exchange information between systems.

Jitter

Variability in network delay that can affect voice and video quality.

Keyboard

An input device used to enter text and commands into a computer.

KVM Switch

A device that allows one keyboard, video, and mouse to control multiple computers.

Kernel

The core component of an operating system that manages system resources.

LAN

A Local Area Network connects devices within a limited physical area.

Least Privilege

A security principle that grants users only the access necessary for their role.

Load Balancer

A system that distributes traffic across multiple servers to improve performance.

Log File

A record of system events used for monitoring and troubleshooting.

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to systems.

Migration

The process of moving data, applications, or systems to a new environment.

MSP

A Managed Service Provider delivers ongoing IT support and management services.

Multi-Factor Authentication

A security method requiring two or more verification factors.

Network

A group of interconnected devices that share data and resources.

NAS

Network Attached Storage provides centralized file storage over a network.

NAT

Network Address Translation maps private IP addresses to public ones.

NGAV (Next-Generation Antivirus)

Advanced antivirus technology that uses behavior analysis and machine learning to detect threats beyond known signatures.

NIST (National Institute of Standards & Technology)

A U.S. government agency that develops cybersecurity standards and frameworks to help organizations manage and reduce security risk.

NOC

A Network Operations Center monitors and manages IT infrastructure.

Onboarding

The process of securely integrating new users or clients into IT systems.

Offboarding

The secure removal of access when users leave an organization.

Operating System (OS)

Software that manages hardware and runs applications.

Outage

A period when systems or services are unavailable.

OAuth

An authorization framework that allows secure access without sharing passwords.

Patch Management

The process of applying updates to fix security vulnerabilities and bugs.

Phishing

A cyberattack that uses deceptive messages to steal sensitive information.

Power Supply

Hardware that delivers electrical power to computer components.

Quality of Service (QoS)

Network controls that prioritize critical traffic.

Quarantine

Isolating potentially harmful files or systems to prevent spread.

Query

A request for data from a database or system.

RAM (Random Access Memory)

Short-term system memory that temporarily stores data and applications actively

Ransomware

Malware that encrypts data and demands payment for restoration.

Redundancy

Duplication of systems or components to improve reliability.

Remote Access

Connecting to systems from a different physical location.

Risk Assessment

An evaluation of security threats and vulnerabilities.

RMM

Remote Monitoring and Management software used by IT teams.

Server

A computer that provides services or resources to other devices.

Switch

A network device that connects devices within a LAN.

SIEM

Security Information and Event Management collects and analyzes security data.

SLA (Service Level Agreement)

A contract defining service expectations and response times.

SSD (Solid State Drive)

A high-speed storage device that uses flash memory instead of moving parts for faster performance and reliability.

Two-Factor Authentication

A login method requiring a password and an additional verification step.

Throughput

The actual amount of data transmitted over a network.

Token

A digital object used for authentication or authorization.

Uptime

The amount of time a system remains operational.

User Account

A profile that defines a user’s access and permissions.

UPS

An Uninterruptible Power Supply provides temporary backup power.

vCIO

Virtual Chief Information Officer services provide strategic IT leadership.

Virtualization

Running multiple virtual systems on a single physical machine.

VPN

A Virtual Private Network encrypts internet traffic for secure access.

Vulnerability

A weakness that can be exploited by attackers.

WAN

A Wide Area Network connects multiple LANs over large distances.

Web Server

A system that hosts and delivers websites.

Wi-Fi

Wireless networking technology for connecting devices to networks.

XDR (Extended Detection & Response)

A security platform that correlates threats across multiple systems.

XML

A markup language used to store and transport structured data.

XSS

Cross-Site Scripting is a web vulnerability that injects malicious code into websites.

YubiKey

A physical security key used for strong authentication.

YAML

A human-readable data format often used for configuration files.

Yield

The effective performance output of a system or process.

Zero Trust

A security model that requires continuous verification of users and devices.

Zoning

Segmenting networks to improve security and performance.

ZFS

A file system designed for data integrity and scalability.