Technology is always changing and evolving quickly. It can be difficult to keep up with everything a user needs to know. This handy guide is meant to be a quick reference for any tech terms that might be new to you. Bolded terms within definitions are found elsewhere in the document. Let’s translate this technobabble!
Anti-Spam: Software designed to identify and block spam or unwanted emails
Authentication: Confirming a user’s identity to allow access, usually with passwords, biometrics, or security tokens
Biometrics: Using physical features, like fingerprints or facial recognition, to verify someone’s identity
Business Continuity Plan: Preparations to help start business operations as soon as possible after a disruption or disaster
Business Email Compromise (BEC): A type of phishing in which attackers use targeted, spoofed emails to gain access to someone’s inbox
Cloud Computing: Provides services over the Internet like storage or processing, allowing resources to be accessible and scalable
Conditional Access: Only grants a user access when they meet certain conditions, like location or compliant devices
Data Center: A facility that processes large amounts of data, such as computer servers, storage systems, and networking equipment
Disaster Recovery Plan: Similar to a Business Continuity Plan, this is a detailed strategy to recover and restore operations and data after a disaster
Distribution List: An email address that forwards email it receives to multiple users defined in the list. See M365 Group Emails to learn how they differ from Distribution Lists
- Alias: In the context of emails (such as Distribution Lists or M365 Group Emails), an additional email address that can be used to reach a user
DMARC: Aka Domain-based Message Authentication, Reporting, and Conformance, this protocol helps prevent email spoofing by ensuring email authentication
DNS (Domain Name System): A system that changes domain names (like example.com) into IP addresses
Encryption: The conversion of data into a coded format to protect sensitive information
Firewall: Security feature that monitors and controls network traffic to protect internal networks from untrustworthy external networks
Generative AI: Artificial Intelligence that can create new content, such as text, images, or music
Grayware: Software that isn’t designed to be malicious but can still pose security risks or worsen a user’s experience
Help Desk: A support service that assists users by troubleshooting technical issues related to hardware, software, or networks
IP Address: A unique identifier assigned to devices connected to the internet
IT Assessment: A comprehensive review of an organization’s IT systems, policies, and infrastructure to identify risks, gaps, and opportunities for improvement. Check out our IT checklist for inspiration!
LLM (Large Language Model): A type of artificial intelligence that is trained on massive datasets
Malware: Malicious software like viruses, worms, or spyware designed to harm or gain unauthorized access to systems
M365 Group Emails: A more collaborative approach to distribution lists in which users also share a mailbox, calendar, and files
Mobile Device Management (MDM): Tools used to secure and manage employees’ mobile devices to ensure compliance and protect data
Multifactor Authentication (MFA): A security practice that requires users to verify their identity using two or more methods, such as a password and a code from an app. 2FA (two factor authentication) and 2SV (two step verification) are synonymous, with two factors implied
Passwordless Sign-in: A security practice that allows users to identify using an account/email and factor(s) other than a password, such as a passkey
Passkey: A physical or digital device with a small amount of encrypted data that resembles a “key” to sign in to a service. This is used to prove a user’s identity, often as part of passwordless sign-in
Penetration Test: A simulated cyberattack used to test the security of a system and identify vulnerabilities before they can be exploited
Personally Identifiable Information (PII): Personal data, such as names or Social Security numbers, that are used to identify an individual
Phishing: A targeted cyberattack in which attackers trick individuals into revealing sensitive information with fake emails or websites
Ransomware: Malicious software that encrypts a victim’s data and then allows the threat actor to demand payment for the decryption of stolen data
Remote Backup: Data stored securely in an offsite location, ensuring fast recovery in case of disasters or technical failures
Security Token: Similar to a passkey, but used to keep a device or program “logged in” without the constant need of a sign-in
Sensitive Information: Critical data that requires protection, like trade secrets, financial records, or personal information
Server: A powerful computer or system that is designed to provide resources, data, or services to other devices in a network and the people using them
Shared Mailbox: A mailbox that multiple users can access to read and send emails from a common email address
Single Sign-On (SSO): Authentication process that allows individuals to access multiple applications or systems with a single set of credentials, like a code emailed to the user
SOC (Security Operations Center): A centralized unit or team that monitors, detects, and responds to cybersecurity threats in an organization’s systems and networks
SMTP (Simple Mail Transfer Protocol): A set of standards used for sending and relaying emails, followed especially for emails sent in high volumes
SPF (Sender Policy Framework): An email authentication method designed to prevent email spoofing by verifying that sender IP addresses are authorized by the domain owners
Spyware: Malicious software that secretly gathers information about a user’s activities, often for fraudulent or intrusive purposes
Trojan: A type of malicious software that is disguised as legitimate applications or files that, when used, can compromise systems or steal sensitive information
Two-factor Authentication (2FA): A form of Multifactor Authentication (MFA) in which two methods of authentication are used
Virus: Malicious software designed to infect systems, replicate itself, and infect the systems to disrupt operations or compromise data
Virtual Private Network (VPN): A secure connection that encrypts data and protects online activities by routing traffic through a private server for privacy and anonymity
Worm: A self-replicating malicious program that spreads across systems without user intervention