
IT Glossary
Decode Geek Speak with Our IT Glossary
Get functional, plain-English definitions of common IT terms with easy-to-digest analogies and real-world examples.
A
Active Directory
- Definition: A next-generation firewall that not only filters traffic but also analyzes it deeply to detect and block sophisticated threats.
- Analogy: Think of it as a security guard who checks both your ID and your bags, rather than just glancing at you from afar.
- Example: An advanced firewall might automatically block unusual data patterns from an unknown country, preventing targeted intrusions.
Access Point
- Definition: Devices (often wireless routers) that let people connect to a network.
- Analogy: Think of them as the “front doors” to your office network.
- Example: A business with multiple floors installs a Wi-Fi access point on each floor so employees have a strong signal everywhere.
Access Point
- Definition: Devices (often wireless routers) that let people connect to a network.
- Analogy: Think of them as the “front doors” to your office network.
- Example: A business with multiple floors installs a Wi-Fi access point on each floor so employees have a strong signal everywhere.
Advanced Firewall
- Definition: A next-generation firewall that filters traffic and inspects it for sophisticated threats.
- Analogy: Like a security guard who checks both your ID and your bags, not just who you say you are.
- Example: Automatically blocking suspicious traffic patterns from foreign countries known for cyberattacks.
AI (Artificial Intelligence)
- Definition: Software that mimics human thinking to handle tasks like speech recognition, decision-making, or text analysis.
- Analogy: Like having a virtual assistant who learns from experience to do routine work faster and better.
- Example: Grammarly uses AI to check the tone of your writing and suggest clearer words or grammar fixes.
Anti-Spam
- Definition: Tools that block or filter out unwanted emails.
- Analogy: Like a bouncer who turns away junk mail at the door before it clutters your inbox.
- Example: Microsoft 365 can automatically send suspicious mass emails to a spam folder.
Anti-Virus
- Definition: Software that scans, identifies, and removes malware (viruses, trojans, etc.) from your devices.
- Analogy: A guard dog that sniffs out unwanted intruders trying to sneak into your home.
- Example: Windows Defender blocking a known virus before it can damage your files.
App (Application)
- Definition: A piece of software that runs on on your computer or a server (cloud or onsite) to perform specific tasks.
- Analogy: An individual power tool that is purpose-built for a particular job, such as drilling holes.
- Example: Adobe Reader, AutoCAD, Google Chrome, QuickBooks, etc.
Attack Vector
- Definition: The different ways or paths that hackers use to break into a system.
- Analogy: Like windows and doors in a house—a burglar can use any unprotected or weak entry point to gain access.
- Example: Activities like phishing emails or old unpatched systems that can act as the entry-point for cybercriminals.
Audit Logs
- Definition: A recorded list of everything that happens in your system—who logged in, what they opened, what changed, etc.
- Analogy: A security camera’s footage, capturing all comings and goings.
- Example: When there’s a data breach, investigators check audit logs to see when and how the hacker gained access.
Automation
- Definition: Technology that finishes routine or repetitive tasks without needing constant human oversight.
- Analogy: Like a factory conveyor belt, moving items along instead of relying on workers to pass them by hand.
- Example: One-click checkouts on retail websites—turning a five-minute purchase into a quick, two-minute process.
B
Backup
- Definition: Copies your data and storing it in a safe place so you can recover it from system failure or attack.
- Analogy: Like making a spare key for your house and keeping it in a secure lockbox.
- Example: Regularly backing up QuickBooks or your files so you can restore them later.
Bandwidth
- Definition: A maesure of the amount of data (information) that can move through your internet connection.
- Analogy: A highway’s capacity—more lanes means more cars can drive together without congestion.
- Example: Upgrading your office’s internet speed from 50 Mbps to 500 Mbps to download / upload faster.
Botnet
- Definition: A network of computers infected with malicious software and controlled remotely by cybercriminals.
- Analogy: A zombie army taking orders from a hidden master.
- Example: A hacker can use a botnet of thousands of computers to flood a website with traffic and knock it offline (DDoS).
Bring Your Own Device (BYOD)
- Definition: A policy allowing employees to use personal phones or laptops for work.
- Analogy: Letting people drive their own cars for company business instead of using a fleet car.
- Example: A sales rep uses their personal iPhone to access corporate email—secured by company-approved apps.
Business Continuity
- Definition: A plan ensuring a business can operate even after emergencies (storms, cyberattacks, or outages).
- Analogy: Having a generator that kicks in when the power goes out, so the lights never go off.
- Example: If a fire destroys the office, employees can work remotely using cloud data backups and keep the business running.
C
C-Suite
- Definition: The executive leadership roles in an organization, like CEO, CFO, COO, CIO, CTO, etc.
- Analogy: The generals in an army—each leads a different division but all guide the overall strategy.
- Example: You might present an IT budget plan to the C-Suite for approval on large tech investments.
Centralized Password Manager
- Definition: A secure tool that stores all your passwords in one encrypted vault.
- Analogy: A single master key that unlocks different doors without you juggling separate keys.
- Example: Tools like 1Password or LastPass generate unique logins for websites, then store and enters them securely.
Cloud
- Definition: Servers and software you access over the internet instead of hosting on your own machines.
- Analogy: Like renting a storage unit instead of building a bigger garage at home.
- Example: Using Google Drive or Microsoft OneDrive to store your files so they don’t only live on your cellphone.
Compliance
- Definition: Rules, laws, or industry standards that require certain security or data-handling measures (like HIPAA, GDPR).
- Analogy: Like obeying traffic laws to avoid tickets—here, you obey regulations to avoid fines or legal trouble.
- Example: A hospital uses secure data-sharing methods to meet HIPAA requirements for protecting patient information.
Content Filtering
- Definition: Software or hardware that blocks or allows websites and emails based on safety or policy rules.
- Analogy: A club doorman who only admits guests on the approved list, rejecting shady visitors.
- Example: When Google Chrome blocks a risky website on company computers to keep users protected.
Cyber Hygiene
- Definition: Routine practices that keep your digital environment safe, like using strong passwords or updating software.
- Analogy: Washing your hands regularly or brushing your teeth to stay healthy.
- Example: A company policy enforcing password changes every 90 days and requiring antivirus scans weekly.
Cyber Threat Hunting
- Definition: Actively searching for hidden cyber threats in your network before they cause harm.
- Analogy: Going on patrol in a neighborhood to find suspicious activity instead of waiting for a break-in.
- Example: Security pros spot unusual logins at 3 a.m. and shut down a hacker’s access before data is stolen.
Cybersecurity Risk Audit
- Definition: Checking your IT environment and business processes for IT weaknesses to guide your defense strategies.
- Analogy: A proactive home inspection that reveals your roof has been leaking before the damage gets worse.
- Example: Finding an update is missing that could prevent your files to be accessed without login.
Cybersecurity Policy Templates
- Definition: Pre-made versions of documents outlining your organization’s security do’s and don’ts.
- Analogy: An employee handbook with guidelines everyone must follow to stay safe and organized.
- Example: An Acceptable Use Policy that says employees cannot download unapproved software.
D
Dark Web
- Definition: A hidden part of the internet not indexed by regular search engines, often used for illegal trades (stolen data, passwords, etc.).
- Analogy: Like back-alley markets where people sell illegal goods under the radar.
- Example: Hackers selling stolen usernames and passwords to the highest bidder.
DaaS (Desktop as a Service)
- Definition: A lease-based workstation computer as a service that reduces the need for capital up front.
- Analogy: Similar to leasing a car—you avoid the large upfront cost to get it now and decide to buy or upgrade later.
- Example: Dell offers competitive monthly rates for laptop and desktop computers to ease start-up costs.
Data Analytics & Business Intelligence
- Definition: Turning raw data into insights that help you make better business decisions.
- Analogy: Like assembling puzzle pieces to reveal the big picture.
- Example: Tracking monthly sales in a dashboard to spot buying trends and plan inventory.
Data Center
- Definition: A specialized facility that houses computer systems and networking equipment to store and process data.
- Analogy: A secure warehouse for digital information, with climate control and 24/7 security.
- Example: Many businesses rent space in large data centers instead of maintaining servers in-house.
Data Encryption
- Definition: Scrambling information into unreadable code so only authorized users with the proper “key” can read it.
- Analogy: Locking a letter in a strongbox requires the correct key to unlock it.
- Example: Storing credit card details in an encrypted database so they’re useless if stolen.
Data Leak Prevention (DLP)
- Definition: Tools and strategies to keep sensitive data from leaving your organization without proper permission.
- Analogy: A customs checkpoint that scans for hidden valuables leaving the country.
- Example: Blocking an employee from emailing confidential reports to their personal account.
Distributed Denial of Service (DDoS)
- Definition: An attack that floods a network or website with so much fake traffic that genuine visitors can’t get in.
- Analogy: A stampede blocking the entrance to a store, stopping real customers from entering.
- Example: Overloading a popular gaming site with millions of bot requests, causing it to crash.
Device Lifecycle Management
- Definition: Overseeing a device’s entire journey—from purchase and setup to upgrades and final disposal.
- Analogy: Caring for a company car: regular maintenance, eventual trade-in, and compliance checks.
- Example: Cycling out old laptops after three years, then securely wiping and recycling them.
Disaster Recovery
- Definition: A plan and process to restore IT systems and data after a major incident (like a cyberattack or natural disaster).
- Analogy: Having flood insurance and backup generators ready so you can rebuild quickly when disaster strikes.
- Example: Keeping spare server images offsite so you can switch to backups with minimal downtime if your main site goes down.
Disaster Recovery
- Definition: A plan and process to restore IT systems and data after a major incident (like a cyberattack or natural disaster).
- Analogy: Having flood insurance and backup generators ready so you can rebuild quickly when disaster strikes.
- Example: Keeping spare server images offsite so you can switch to backups with minimal downtime if your main site goes down.
E
Email Filtering
- Definition: Tools that sort incoming mail, removing spam, phishing attempts, and malicious links before they reach users.
- Analogy: A sieve that catches dirt so only clean water passes through.
- Example: Marking suspicious “bank alert” emails as junk and preventing them from hitting your inbox.
Email Security
- Definition: A bundle of tools (anti-spam, antivirus, encryption, etc.) protecting your email from hacks or scams.
- Analogy: A fortified mailbox with multiple locks and screening mechanisms.
- Example: Using a third-party gateway to scan all messages for viruses or phishing links before they appear in Outlook.
End of Life (EOL)
- Definition: When a vendor stops selling or marketing a product (hardware or software) and eventually ends its support.
- Analogy: A car model that’s been discontinued—no more new units and parts soon become hard to find.
- Example: In October 2025, when Windows 10 becomes EOL, Microsoft will no longer provide security updates.
Endpoint
- Definition: Any device that connects to a network (desktops, laptops, phones, printers, servers, etc.).
- Analogy: Each seat in a theater is part of one big auditorium.
- Example: A single employee might have multiple endpoints: laptops, smartphones, and tablets.
F
Firewall
- Definition: Hardware or software that filters network traffic based on security rules, blocking unauthorized access.
- Analogy: A locked gate checking IDs before letting people in or out.
- Example: A next-gen firewall blocking suspicious connections from known hacker IPs.
Fractional (Executive)
- Definition: A part-time or outsourced executive instead of a full-time employee (e.g., fractional CFO, fractional CIO, etc.)
- Analogy: Renting a specialized chef for a big event rather than employing them year-round.
- Example: Hiring a fractional IT Security Officer during cybersecurity audits without keeping them on permanent payroll.
G
Governance, Risk, and Compliance (GRC)
- Definition: The practice of establishing and managing IT policies, procedures, and plans so technology decisions support business goals and regulatory requirements.
- Analogy: Like a board of directors ensuring the company’s money and projects are used wisely.
- Example: Requiring management approval before purchasing new software so it aligns with company security standards.
H
Help Desk
- Definition: A support service (phone, chat, ticket system) for employees who need technical assistance with hardware, software, or network issues.
- Analogy: An IT “911” line—call or submit a ticket, and specialists help fix the problem.
- Example: When employees’ laptops won’t connect to Wi-Fi, they contact the Help Desk to troubleshoot.
I
Identity & Access Management (IAM)
- Definition: Systems and policies ensuring the right people have the right level of access to the right resources.
- Analogy: Issuing out color-coded badges so employees can enter only the rooms relevant to their job.
- Example: An accountant can open financial software; a receptionist cannot.
Infrastructure
- Definition: The physical and virtual backbone of an IT environment—servers, cables, firewalls, routers, and cloud services.
- Analogy: The beams, wires, and plumbing of a building that keep everything running smoothly.
- Example: Upgrading office Wi-Fi routers to handle more users and faster internet.
Internet Service Provider (ISP)
- Definition: A company that delivers internet connectivity (cable, fiber, DSL, wireless) to homes and businesses.
- Analogy: A water company piping internet “water” into your office instead of H2O.
- Example: Frontier or Optimum (formerly Suddenlink) offering a 500Mbps plan for your headquarters.
Intrusion Detection & Prevention (IDP)
- Definition: Monitoring traffic for suspicious activity (detection) and blocking threats automatically (prevention).
- Analogy: An alarm system that not only triggers a siren but also locks the doors when it detects an intruder.
- Example: Immediately blocking an IP after 10 failed login attempts in one minute.
IT Roadmap
- Definition: A document that charts out upcoming tech projects or upgrades over short-, medium-, and long-term timelines.
- Analogy: A travel itinerary—planning which destinations (projects) you’ll visit and when.
- Example: Replacing a file server this quarter, then migrating to the cloud next year.
IT Steering Committee
- Definition: A group of stakeholders from different departments who review and approve major tech initiatives and budgets.
- Analogy: A small council deciding whether building a new bridge (buying new IT systems) is worth the cost.
- Example: Voting on whether to invest in an advanced firewall based on a recent security assessment.
J
Jump Box
- Definition: A server used as a go-between to access a network remotely, to avoid directly exposing critical systems.
- Analogy: A locked entryway you must pass through before reaching the main building—keeps the real doors hidden.
- Example: Logging into a jump box first, then hopping to a sensitive database server for maintenance.
K
Kerberos
- Definition: A secure method for authenticating service requests between computers on a network.
- Analogy: An official ID check that gives you a “ticket” to move around inside a secure facility.
- Example: Active Directory uses Kerberos tickets so users can access resources without constantly re-entering passwords.
L
Layered Defense
- Definition: A cybersecurity approach using multiple protective layers (firewall, antivirus, training, etc.) so if one fails, another catches the threat.
- Analogy: Having door locks, an alarm, and security cameras—three layers of protection.
- Example: Even if an employee clicks a phishing link, antivirus software or user awareness training might prevent a breach.
License Management
- Definition: Tracking and renewing software/hardware licenses, ensuring compliance and cost efficiency.
- Analogy: Keeping an organized list of car registrations so you don’t overpay for vehicles you no longer use.
- Example: Canceling extra Microsoft 365 accounts after employees leave to save license fees.
M
Managed Detection & Response (MDR)
- Definition: A 24/7 security service that detects cyber threats and takes rapid action (like quarantining malware).
- Analogy: A security firm that not only spots a burglar but also tackles them on the spot.
- Example: Automatically isolating an infected laptop from the network at 2 a.m. to contain malware.
Managed Service Provider (MSP)
- Definition: An outsourced IT company that monitors, manages, and secures your systems for a monthly fee.
- Analogy: A service center taking care of all your car’s maintenance—oil changes, repairs, inspections—on a flat-rate plan.
- Example: An MSP handles help desk support, software patching, and network monitoring so you can focus on core business.
Managed Security Service Provider (MSSP)
- Definition: A specialized provider (often an MSP) that monitors, manages, and secures your systems for a monthly fee.
- Analogy: Hiring a specialized security guard to watch your digital doors.
- Example: An MSSP handles defending, checking for, and general mitigation of cyber attacks.
Managed Services Agreement (MSA)
- Definition: The primary contract between you and your IT provider, detailing what services they’ll deliver and at what cost.
- Analogy: A lease outlining rent, utilities, and who handles repairs in a rented apartment.
- Example: An MSA usually includes unlimited remote support but may limit onsite visits monthly.
Microsoft Office 365
- Definition: A subscription suite of office tools—Word, Excel, PowerPoint, Outlook, Teams—accessible online or offline.
- Analogy: A digital toolbox for everyday tasks: writing docs, managing email, and holding video calls.
- Example: Collaborating on a shared Excel sheet in real-time with coworkers working at different locations.
Mobile Device Management (MDM)
- Definition: Software that secures and manages smartphones, tablets, and laptops from a central console.
- Analogy: A universal remote that can lock or wipe any device in your organization.
- Example: Remotely wiping a stolen smartphone to protect company emails and data.
Multifactor Authentication (MFA)
- Definition: Requiring at least two verifications (like password + code texted to your phone) to log in.
- Analogy: During prohibition, Speakeasy venues often required patrons to use secret passwords before entry.
- Example: Locking your front door with both a keyed doorknob and a deadbolt.
N
Network Operations Center (NOC)
- Definition: A centralized hub where IT pros monitor and manage networks, servers, and systems in real-time.
- Analogy: Mission control monitoring for any red alerts on a spaceship.
- Example: The NOC sees a server needs rebooting and fixes it remotely before staff arrive at 9 a.m.
O
Operating System (OS)
- Definition: The core software that manages a device’s hardware and applications (Windows, macOS, Linux, etc.).
- Analogy: A conductor ensuring all the instruments (programs) play together in harmony.
- Example: Upgrading from Windows 10 to Windows 11 to get new features and security patches.
P
Patch Management
- Definition: Updating software with the latest security fixes and performance tweaks.
- Analogy: Patching small holes in a boat before they sink you.
- Example: Installing monthly Windows updates to plug vulnerabilities.
Penetration Testing (Pentesting)
- Definition: Hiring ethical hackers to try breaking into your systems, revealing weak spots.
- Analogy: A locksmith testing your doors to see if they can “keycard” into your locks.
- Example: Learning an old firewall version is easy to bypass, prompting an urgent upgrade.
Phishing Simulations
- Definition: Hiring ethical hackers to try breaking into your systems, revealing weak spots.
- Analogy: A fire drill where no one is hurt, but everyone learns how to respond.
- Example: A fake (but safe) email sent by the CEO asking for gift cards to see if staff recognize the red flags.
Plug ‘n’ Play
- Definition: A marketing term suggesting a device works immediately upon connection, usually requiring minimal setup.
- Analogy: A puzzle box labeled “no assembly needed,” though some tweaking often remains.
- Example: A “plug ‘n’ play” printer may need power and wifi but can print without more complicated setup.
Point of Contact
- Definition: The main person who communicates with an IT or service provider on behalf of a company.
- Analogy: A front desk operator routing calls and messages to the correct department.
- Example: The office manager logs help desk tickets or escalate issues to higher-level support.
Privilege Escalation
- Definition: Gaining higher user permissions than allowed, often by exploiting vulnerabilities.
- Analogy: Sneaking into a VIP area using a stolen all-access pass.
- Example: A hacker leveraging a bug to jump from “guest” to “admin” access.
Privileged Access Management (PAM)
- Definition: Monitoring and restricting the use of powerful (admin-level) credentials.
- Analogy: Keeping master keys locked away so only trusted people can borrow them.
- Example: Admin credentials that automatically expire after 2 hours, forcing a re-checkout.
Professional Services Automation (PSA)
- Definition: A platform MSPs use to handle help desk tickets, billing, scheduling, and overall service workflows.
- Analogy: A busy restaurant system that tracks orders, reservations, and kitchen tasks in one app.
- Example: Every user request is logged in the PSA, ensuring no issue slips through the cracks.
Q
Quality of Service (QoS)
- Definition: Network settings prioritizing certain types of traffic (like video calls) over others to ensure stable performance.
- Analogy: Allowing ambulances to speed or use fast lanes so they aren’t stuck behind normal traffic.
- Example: Prioritizing Zoom calls during work hours so important meetings don’t lag even if someone else is streaming video.
R
Ransomware
- Definition: Malicious software that encrypts your files and demands payment for their release.
- Analogy: A digital hostage scenario—pay the ransom or lose access to your valuables.
- Example: Staff clicking a bad link, locking all files, forcing you to restore from backups.
Remote Access
- Definition: Connecting to your company’s systems from outside the office, typically via VPN or remote desktop.
- Analogy: A private tunnel from your home directly to your neighbor’s house or into the office.
- Example: A traveling employee logs into a remote desktop to retrieve files on the office server.
Remote Monitoring & Management (RMM)
- Definition: Tools letting IT teams watch and fix systems offsite without sending a technician physically.
- Analogy: A mechanic diagnosing and repairing your car engine via an online dashboard.
- Example: An MSP receives an alert at 3 a.m. that a server is overheating, and they fix it before morning.
Responsible IT Architecture
- Definition: Up-to-date, secure, business-class infrastructure designed to reduce risks and support your goals.
- Analogy: A well-built house with proper insulation, sturdy foundations, and modern wiring.
- Example: Replacing a 10-year-old firewall that no longer receives security patches, then using MFA to enhance protection.
Routine System Maintenance
- Definition: Regularly scheduled tasks (updating software, checking logs, cleaning hardware) to keep IT systems healthy.
- Analogy: Getting oil changes, rotating tires, and refilling fluids so your car lasts longer.
- Example: Weekly antivirus scans, monthly Windows patches, and quarterly hardware inspections.
S
Secure Access Service Edge (SASE)
- Definition: A framework merging network and security functions (like firewalls, zero trust) into one cloud-based service.
- Analogy: A single security gate that protects every path in and out of your building.
- Example: Employees worldwide follow the same firewall and filtering rules, whether they’re at home or traveling.
Security Awareness Training (SAT)
- Definition: Teaching staff to recognize and avoid cyber threats—phishing, malware, suspicious links, etc.
- Analogy: A safety course so everyone knows how to spot and handle fire hazards.
- Example: A monthly quiz reminding employees how to detect fake invoice emails.
Security Incident & Event Management (SIEM)
- Definition: Software that gathers logs from across your network, spotting suspicious patterns or attacks in real time.
- Analogy: A citywide camera network immediately alerts authorities to unusual activity.
- Example: SIEM notes multiple failed logins across different servers at odd hours, raising an immediate alert.
Security Operations Center (SOC)
- Definition: A dedicated team that monitors threats around the clock, investigating and responding to incidents.
- Analogy: Police, Fire, and EMS agencies are on duty 24/7, ready to respond to emergencies.
- Example: SIEM notes multiple failed logins across different servers at odd hours, raising an immediate alert.
Single Sign On (SSO)
- Definition: A connection that allows users to sign-in once, with one credential set, to multiple services or systems.
- Analogy: Giving an employee one keycard that has access to many doors in a building.
- Example: Employees can sign into their Windows computer using their Microsoft 365 email and password.
Software-Defined Wide Area Network (SD-WAN)
- Definition: A virtual networking approach that routes traffic over multiple internet connections for optimal performance.
- Analogy: A GPS that always picks the fastest or least congested road.
- Example: Passing video calls through a faster fiber ISP while routing email over a slower cable ISP line.
Spyware
- Definition: Malicious software that secretly gathers information (like login credentials) from your computer.
- Analogy: A hidden camera peeking at everything you type.
- Example: A web browser plugin seemlingly helps you find deals, but actually allows someone access to your bank.
System Administration
- Definition: The proactive upkeep—documenting, patching, organizing—of IT systems so they run smoothly.
- Analogy: A building manager that ensures the water lines, electric breakers, and HVAC all function properly.
- Example: Noticing a file server running out of space and freeing some up before it crashes.
T
Technical Debt
- Definition: The hidden cost of delaying IT updates—leading to bigger risks and more expensive work later.
- Analogy: Driving a car on bald tires and ignoring them can lead to a blowout and bigger bills down the road.
- Example: Skipping server upgrades year after year until a major crash forces emergency spending.
U
Unified Communications as a Service (UCaaS)
- Definition: A cloud-based service merging phone calls, video conferencing, and messaging into one platform.
- Analogy: One app for all communication—voice, chat, and virtual meetings—so you don’t juggle multiple tools.
- Example: RingCentral or Microsoft Teams letting users switch from a text chat to a video call in one click.
Uninterruptible Power Supply (UPS)
- Definition: A battery backup that keeps devices running briefly during a power outage, preventing data loss.
- Analogy: A flashlight when the lights go out, giving you time to find the generator.
- Example: If electricity fails, a UPS keeps your server alive for 10 minutes so you can shut it down properly.
User
- Definition: Anyone who logs into and uses a business’s computers, applications, or networks.
- Analogy: A driver behind the wheel; each with unique driving habits and license type.
- Example: A company with 50 employees (users) each needing unique logins and security permissions.
V
Vendor Management
- Definition: When your IT provider deals with third-party vendors (ISPs, copier companies, software developers) for you.
- Analogy: A personal assistant who sits on hold and negotiates with service providers so you don’t have to.
- Example: An MSP calling the printer vendor to troubleshoot error codes on your office multifunction machine.
Virtual
- Definition: Refers to things that don’t physically exist on-site—remote staff, cloud servers, or fractional roles.
- Analogy: A remote “office” in the cloud instead of a brick-and-mortar building.
- Example: A Virtual CISO (vCISO) advising on security strategy part-time without a permanent office at your company.
Virtual CISO (vCISO)
- Definition: Virtual executives focused on strategic guidance on cybersecurity, compliance, and risk management
- Analogy: A part-time expert pilot hired only when you need to navigate the most turbulent skies.
- Example: A start-up hires a vCISO to help plan and implement ISO:27001 (or similar) compliance requirements.
Vulnerability Management
- Definition: Continuously seeking out and fixing security weaknesses in your systems before criminals exploit them.
- Analogy: Regularly testing every door and window to ensure no lock is broken or loose.
- Example: Automatic scans that alert IT if a device is missing patches or using default admin passwords.
W
Wide Area Network (WAN)
- Definition: A network that spans multiple geographical locations, connecting local networks (LANs) across cities or countries.
- Analogy: A highway system linking separate towns so you can easily travel between them.
- Example: Offices in three states share data via a private WAN, managed by their ISP.
Web Hosting
- Definition: Renting server space so your website is publicly accessible on the internet.
- Analogy: Leasing a plot of virtual land for your digital “house” (website).
- Example: Hosting a website on GoDaddy or Azure so users either regionally or worldwide can visit it.
Web Filtering
- Definition: Blocking or restricting certain websites or categories (malicious, adult, gambling) to reduce threats and distractions.
- Analogy: A parental control feature that stops kids from visiting dangerous websites.
- Example: A corporate-controlled service prevents employees from accidentally landing on known phishing sites.
Web Filtering
- Definition: Blocking or restricting certain websites or categories (malicious, adult, gambling) to reduce threats and distractions.
- Analogy: A parental control feature that stops kids from visiting dangerous sites.
- Example: A corporate firewall preventing employees from accidentally landing on known phishing domains.
X
XDR (Extended Detection & Response)
- Definition: A security approach pulling data from various sources, and analyzing it together to detect complex threats.
- Analogy: A neighborhood watch network where every camera and alarm shares data, spotting intruders quickly.
- Example: Noticing a suspicious email plus weird login activity on a server and linking them as part of the same attack.
Y
YubiKey
- Definition: A physical security key that includes MFA for logging in, giving strong protection against phishing.
- Analogy: A special key fob you must insert or tap to confirm “Yes, it’s really me.”
- Example: Instead of a text code, users plug a YubiKey into their USB port to prove their identity.
Z
Zero Trust
- Definition: A strict security model where no one is trusted by default, and every access request must be authenticated.
- Analogy: An ID check at every door, even if you just walked through one moment ago.
- Example: After logging into the network, you must still use MFA for each separate application or database.