A

Active Directory (AD)

Microsoft’s system for managing users, devices, and security policies across a business network.

Antivirus Software

Software that prevents, detects, and removes malicious programs like viruses, worms, and Trojans.

Artificial Intelligence (AI)

Computer systems that simulate human intelligence for automation, analytics, or security tasks.

Authentication

Verifying a user’s identity before granting access to systems or data.

B

Backup

A copy of files/data stored separately to restore information in case of loss or corruption.

Bandwidth

The amount of data that can travel over an internet connection in a given time.

Bring Your Own Device (BYOD)

A policy that allows employees to use personal devices for work.

Business Continuity

The ability for a company to keep operating during and after unexpected disruptions.

C

Cloud Computing

Delivery of IT resources (servers, storage, apps) over the internet instead of local hardware.

Compliance

Adhering to laws, regulations, and industry standards for data security and IT operations.

Cybersecurity

Practices and tools that protect systems, networks, and data from unauthorized access or attack.

D

Data Breach

Unauthorized access or disclosure of confidential or sensitive data.

Data Center

A facility hosting servers, storage, and networking equipment for business IT operations.

Data Encryption

Converting information into a secure code to prevent unauthorized access.

Disaster Recovery (DR)

Plans and processes to restore IT systems and data after cyberattacks or major failures.

Distributed Denial of Service (DDoS)

An attack that overwhelms a network or website with traffic to cause downtime.

Domain Name System (DNS)

Translates website names (e.g., example.com) into IP addresses—the internet’s “phonebook.”

E

Email Security

Protection against email-borne threats like phishing, spam, and malware.

Endpoint

Any device connected to a network—laptops, desktops, tablets, or smartphones.

Endpoint Detection and Response (EDR)

Security that monitors endpoints for suspicious behavior and responds to threats.

F

Firewall

Hardware/software that controls network traffic to block threats based on security rules.

H

Help Desk

Technical support service for troubleshooting IT issues.

Hybrid Cloud

An environment combining on-premises infrastructure with public/private cloud services.

I

Infrastructure as a Service (IaaS)

Renting compute, storage, and networking from a cloud provider instead of buying hardware.

Information Technology (IT)

Use of computers, networks, and systems to store, process, and share information.

Internet of Things (IoT)

Everyday devices connected to the internet that collect and share data.

Intrusion Detection System (IDS)

Monitors network traffic for suspicious or malicious activity.

Intrusion Prevention System (IPS)

Detects and actively blocks suspicious network activity.

IT Infrastructure

The hardware, software, networks, and facilities powering business IT operations.

L

Latency

The delay between sending and receiving data across a network.

Local Area Network (LAN)

A private network connecting devices within a limited area, like an office.

M

Managed Service Provider (MSP)

A company that remotely manages IT systems and support on a subscription basis.

Malware

Malicious software designed to harm, exploit, or steal from computers and networks.

Multi-Factor Authentication (MFA)

Security requiring multiple verification steps (e.g., password + fingerprint).

N

Network Monitoring

Continuous observation of a network to detect performance issues or intrusions.

O

On-Premises

IT systems or software installed and run within a company’s own facilities.

Operating System (OS)

Software that manages computer hardware and enables other programs (e.g., Windows, macOS, Linux).

P

Patch Management

The process of updating software with fixes to improve security and performance.

Phishing

Deceptive emails, calls, or sites that trick users into revealing sensitive information.

Platform as a Service (PaaS)

Cloud tools for building apps without managing servers and underlying infrastructure.

Private Cloud

A cloud environment dedicated to one organization for greater control and security.

Public Cloud

Shared cloud services offered by providers like AWS, Azure, or Google Cloud.

R

Ransomware

Malware that encrypts files and demands payment to restore access.

Remote Desktop

Technology that allows access to a computer or network from another location.

Remote Monitoring and Management (RMM)

Tools MSPs use to monitor and maintain systems without being onsite.

S

Scalability

The ability for systems to handle growth and increased demand without issues.

Service Level Agreement (SLA)

A contract defining service levels, including uptime guarantees and response times.

Single Sign-On (SSO)

One login grants access to multiple applications.

Software as a Service (SaaS)

Cloud-hosted applications accessed via the internet (e.g., Microsoft 365, Zoom).

Spam

Unwanted or unsolicited emails, often used for scams or advertising.

Spyware

Malware that secretly monitors and collects information from a user’s device.

T

Trojan Horse

Malware disguised as legitimate software to trick users into installing it.

V

Virtual Machine (VM)

Software that simulates a separate computer environment on existing hardware.

Virtual Private Network (VPN)

A secure, encrypted tunnel for connecting to a private network over the internet.

Virus

Malware that spreads by attaching itself to files and programs.

Voice over Internet Protocol (VoIP)

Phone service delivered over the internet instead of traditional phone lines.

Vulnerability

A weakness in software, hardware, or processes that attackers can exploit.

W

Wide Area Network (WAN)

A network that connects multiple locations over large distances, often using the internet.

Z

Zero-Day Exploit

An attack that targets a software vulnerability before a fix is available.

Zero Trust Security

A model that assumes no user or device is trusted by default—verify everything.