Resources
Whether you are a business owner with limited technical experience or a seasoned technology leader, we are here to help. We understand that IT is filled with acronyms and jargon that can be overwhelming. These terms and definitions are designed to make the technology landscape easier to understand and help you feel more confident navigating it.
The methods used to determine who can access systems, data, or resources and what actions they can perform.
A device that allows wireless devices to connect to a wired network.
A Microsoft directory service used to manage users, devices, permissions, and policies.
A Microsoft technology that enables interactive content and functionality within applications and browsers.
Software designed to detect, prevent, and remove malicious software.
An Application Programming Interface allows different software systems to communicate and share data.
The recording of system activity to support security monitoring and compliance requirements.
A copy of data stored separately to protect against loss or corruption.
The server-side components of an application that handle data processing and storage.
The maximum amount of data that can be transmitted over a network connection in a given time.
A strategy that ensures critical business operations continue and data can be quickly restored during and after disruptions such as cyberattacks, system failures, or natural disasters.
The delivery of computing services such as servers, storage, and applications over the internet.
Meeting regulatory, legal, and industry standards for data protection and IT operations.
The Central Processing Unit performs calculations and executes instructions for a computer.
Information such as a username, password, or certificate used to verify identity.
A hidden part of the internet accessible through specialized software where illicit data and activities are commonly traded.
The process of copying data to a secure location for recovery purposes.
A facility that houses servers, networking equipment, and storage systems.
Policies that define how long data must be stored and when it can be securely deleted.
A Distributed Denial of Service attack overwhelms systems with traffic to disrupt availability.
A human-readable website address that maps to an IP address.
The Domain Name System translates domain names into IP addresses.
A cybersecurity solution that continuously monitors endpoints to detect, investigate, and respond to threats.
The process of scanning and filtering email messages to block spam, phishing, and malicious content.
Any device connected to a network, such as a computer, phone, or tablet.
The process of converting data into a secure format to prevent unauthorized access.
A wired networking technology commonly used in local networks.
Electronic Protected Health Information stored or transmitted in digital form.
A security system that monitors and filters network traffic based on rules.
Embedded software that controls the basic functions of hardware devices.
The automatic switching to a backup system when a primary system fails.
A device that connects and routes traffic between different networks.
A Graphics Processing Unit accelerates graphics rendering and parallel processing tasks.
A Windows feature that enforces configuration and security settings across devices.
The physical components of a computer or IT system.
A traditional storage device that uses spinning disks to store and retrieve data.
A support service that assists users with IT issues and requests.
A U.S. regulation governing the protection of patient health information.
System design that minimizes downtime through redundancy and failover.
A healthcare standard for exchanging clinical and administrative data between systems.
Software that creates and manages virtual machines.
A structured approach to identifying, managing, and resolving security incidents.
The combined hardware, software, and networks supporting IT operations.
Monitoring systems for signs of unauthorized or malicious activity.
A unique numerical identifier assigned to a device on a network.
Security technology that detects and responds to attacks targeting user identities, credentials, and access systems.
A lightweight data format used to exchange information between systems.
Variability in network delay that can affect voice and video quality.
An input device used to enter text and commands into a computer.
A device that allows one keyboard, video, and mouse to control multiple computers.
The core component of an operating system that manages system resources.
A Local Area Network connects devices within a limited physical area.
A security principle that grants users only the access necessary for their role.
A system that distributes traffic across multiple servers to improve performance.
A record of system events used for monitoring and troubleshooting.
Malicious software designed to damage, disrupt, or gain unauthorized access to systems.
The process of moving data, applications, or systems to a new environment.
A Managed Service Provider delivers ongoing IT support and management services.
A security method requiring two or more verification factors.
A group of interconnected devices that share data and resources.
Network Attached Storage provides centralized file storage over a network.
Network Address Translation maps private IP addresses to public ones.
Advanced antivirus technology that uses behavior analysis and machine learning to detect threats beyond known signatures.
A U.S. government agency that develops cybersecurity standards and frameworks to help organizations manage and reduce security risk.
A Network Operations Center monitors and manages IT infrastructure.
The process of securely integrating new users or clients into IT systems.
The secure removal of access when users leave an organization.
Software that manages hardware and runs applications.
A period when systems or services are unavailable.
An authorization framework that allows secure access without sharing passwords.
The process of applying updates to fix security vulnerabilities and bugs.
A cyberattack that uses deceptive messages to steal sensitive information.
Hardware that delivers electrical power to computer components.
Network controls that prioritize critical traffic.
Isolating potentially harmful files or systems to prevent spread.
A request for data from a database or system.
Short-term system memory that temporarily stores data and applications actively
Malware that encrypts data and demands payment for restoration.
Duplication of systems or components to improve reliability.
Connecting to systems from a different physical location.
An evaluation of security threats and vulnerabilities.
Remote Monitoring and Management software used by IT teams.
A computer that provides services or resources to other devices.
A network device that connects devices within a LAN.
Security Information and Event Management collects and analyzes security data.
A contract defining service expectations and response times.
A high-speed storage device that uses flash memory instead of moving parts for faster performance and reliability.
A login method requiring a password and an additional verification step.
The actual amount of data transmitted over a network.
A digital object used for authentication or authorization.
The amount of time a system remains operational.
A profile that defines a user’s access and permissions.
An Uninterruptible Power Supply provides temporary backup power.
Virtual Chief Information Officer services provide strategic IT leadership.
Running multiple virtual systems on a single physical machine.
A Virtual Private Network encrypts internet traffic for secure access.
A weakness that can be exploited by attackers.
A Wide Area Network connects multiple LANs over large distances.
A system that hosts and delivers websites.
Wireless networking technology for connecting devices to networks.
A security platform that correlates threats across multiple systems.
A markup language used to store and transport structured data.
Cross-Site Scripting is a web vulnerability that injects malicious code into websites.
A physical security key used for strong authentication.
A human-readable data format often used for configuration files.
The effective performance output of a system or process.
A security model that requires continuous verification of users and devices.
Segmenting networks to improve security and performance.
A file system designed for data integrity and scalability.