IT Glossary: Common Tech Terms Explained for Business Owners

by | Jul 15, 2025 | Upcoming Tech, Web

Bookmark this page! This glossary is regularly updated with new tech terms. Last updated: April 2026

Technology is always changing and evolving quickly. It can be difficult to keep up with everything a user needs to know. This handy guide is meant to be a quick reference for any tech terms that might be new to you. Bolded terms within definitions are found elsewhere in the document. Let’s translate this technobabble!

API (Application Programming Interface): A set of rules and protocols that allows different software applications to communicate with each other, enabling integration between systems

Anti-Spam: Software designed to identify and block spam or unwanted emails

Authentication: Confirming a user’s identity to allow access, usually with passwords, biometrics, or security tokens

Biometrics: Using physical features, like fingerprints or facial recognition, to verify someone’s identity

Botnet: A network of compromised computers or devices controlled by cybercriminals to carry out coordinated attacks, such as sending spam or launching DDoS attacks

Business Continuity Plan: Preparations to help start business operations as soon as possible after a disruption or disaster

Business Email Compromise (BEC): A type of phishing in which attackers use targeted, spoofed emails to gain access to someone’s inbox

Cloud Computing: Provides services over the Internet like storage or processing, allowing resources to be accessible and scalable

Cloud Security Posture Management (CSPM): Tools that continuously monitor cloud environments for security misconfigurations and compliance violations to prevent data breaches

Conditional Access: Only grants a user access when they meet certain conditions, like location or compliant devices

Data Center: A facility that processes large amounts of data, such as computer servers, storage systems, and networking equipment

Data Loss Prevention (DLP): Security measures and tools designed to prevent sensitive data from being accessed, shared, or leaked outside an organization

DDoS (Distributed Denial of Service): A cyberattack in which multiple compromised systems overwhelm a target server, website, or network with traffic, making it unavailable to legitimate users

DevOps/DevSecOps: Development practices that combine software development (Dev) with IT operations (Ops); DevSecOps adds security (Sec) throughout the development lifecycle

Disaster Recovery Plan: Similar to a Business Continuity Plan, this is a detailed strategy to recover and restore operations and data after a disaster

Distribution List: An email address that forwards email it receives to multiple users defined in the list. See M365 Group Emails to learn how they differ from Distribution Lists

  • Alias: In the context of emails (such as Distribution Lists or M365 Group Emails), an additional email address that can be used to reach a user

DMARC: Aka Domain-based Message Authentication, Reporting, and Conformance, this protocol helps prevent email spoofing by ensuring email authentication

DNS (Domain Name System): A system that changes domain names (like example.com) into IP addresses

Encryption: The conversion of data into a coded format to protect sensitive information

Endpoint Detection and Response (EDR): Security tools that continuously monitor endpoints (computers, mobile devices) for threats and enable rapid response to detected incidents

Firewall: Security feature that monitors and controls network traffic to protect internal networks from untrustworthy external networks

Generative AI: Artificial Intelligence that can create new content, such as text, images, or music

Grayware: Software that isn’t designed to be malicious but can still pose security risks or worsen a user’s experience

Help Desk: A support service that assists users by troubleshooting technical issues related to hardware, software, or networks

Hybrid Cloud: A computing environment that combines public cloud services with private cloud or on-premise infrastructure, allowing data and applications to move between them

Identity and Access Management (IAM): Security frameworks that manage digital identities and control user access to resources through authentication and authorization policies

Incident Response Plan: A documented strategy outlining how an organization will detect, respond to, and recover from cybersecurity incidents or data breaches

IP Address: A unique identifier assigned to devices connected to the internet

IT Assessment: A comprehensive review of an organization’s IT systems, policies, and infrastructure to identify risks, gaps, and opportunities for improvement. Check out our IT checklist for inspiration!

IoT (Internet of Things): Physical devices connected to the internet that collect and exchange data, from smart home devices to industrial sensors

LLM (Large Language Model): A type of artificial intelligence that is trained on massive datasets

Malware: Malicious software like viruses, worms, or spyware designed to harm or gain unauthorized access to systems

M365 Group Emails: A more collaborative approach to distribution lists in which users also share a mailbox, calendar, and files

Mobile Device Management (MDM): Tools used to secure and manage employees’ mobile devices to ensure compliance and protect data

Multi-cloud: Using multiple cloud computing services from different providers (such as AWS, Azure, and Google Cloud) to meet various business needs

Multifactor Authentication (MFA): A security practice that requires users to verify their identity using two or more methods, such as a password and a code from an app. 2FA (two factor authentication) and 2SV (two step verification) are synonymous, with two factors implied

Passwordless Sign-in: A security practice that allows users to identify using an account/email and factor(s) other than a password, such as a passkey

Passkey: A physical or digital device with a small amount of encrypted data that resembles a “key” to sign in to a service. This is used to prove a user’s identity, often as part of passwordless sign-in

Penetration Test: A simulated cyberattack used to test the security of a system and identify vulnerabilities before they can be exploited

Personally Identifiable Information (PII): Personal data, such as names or Social Security numbers, that are used to identify an individual

Phishing: A targeted cyberattack in which attackers trick individuals into revealing sensitive information with fake emails or websites

Ransomware: Malicious software that encrypts a victim’s data and then allows the threat actor to demand payment for the decryption of stolen data

Remote Backup: Data stored securely in an offsite location, ensuring fast recovery in case of disasters or technical failures

RMM (Remote Monitoring and Management): Software tools that allow IT providers to monitor and manage client systems remotely, enabling proactive maintenance and support

RPO/RTO (Recovery Point Objective / Recovery Time Objective): RPO defines the maximum acceptable data loss in a disaster; RTO defines the maximum acceptable downtime before systems must be restored

SaaS/PaaS/IaaS: Cloud service models: Software as a Service (ready-to-use applications), Platform as a Service (development platforms), Infrastructure as a Service (virtualized computing resources)

Security Token: Similar to a passkey, but used to keep a device or program “logged in” without the constant need of a sign-in

Sensitive Information: Critical data that requires protection, like trade secrets, financial records, or personal information

Server: A powerful computer or system that is designed to provide resources, data, or services to other devices in a network and the people using them

Shadow IT: IT systems, software, or services used within an organization without explicit approval or oversight from the IT department

Shared Mailbox: A mailbox that multiple users can access to read and send emails from a common email address

Single Sign-On (SSO): Authentication process that allows individuals to access multiple applications or systems with a single set of credentials, like a code emailed to the user

SOC (Security Operations Center): A centralized unit or team that monitors, detects, and responds to cybersecurity threats in an organization’s systems and networks

Social Engineering: Manipulating people through psychological tactics to trick them into revealing sensitive information or granting unauthorized access

Spear Phishing vs. Phishing: Phishing targets broad audiences with generic scams; spear phishing is highly targeted, using personalized information to deceive specific individuals or organizations

SMTP (Simple Mail Transfer Protocol): A set of standards used for sending and relaying emails, followed especially for emails sent in high volumes

SPF (Sender Policy Framework): An email authentication method designed to prevent email spoofing by verifying that sender IP addresses are authorized by the domain owners

Spyware: Malicious software that secretly gathers information about a user’s activities, often for fraudulent or intrusive purposes

Supply Chain Attack: A cyberattack that targets a company by compromising a third-party vendor or supplier in its supply chain, exploiting trusted relationships

Technical Debt (Tech Debt): Deferred IT maintenance that can accumulate just like financial debt

Trojan: A type of malicious software that is disguised as legitimate applications or files that, when used, can compromise systems or steal sensitive information

Two-factor Authentication (2FA): A form of Multifactor Authentication (MFA) in which two methods of authentication are used

Virus: Malicious software designed to infect systems, replicate itself, and infect the systems to disrupt operations or compromise data

Virtual Private Network (VPN): A secure connection that encrypts data and protects online activities by routing traffic through a private server for privacy and anonymity

Vulnerability Management: The ongoing process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and software

Whaling: A targeted form of phishing that specifically attacks high-profile executives or senior leaders (“big fish”) to steal sensitive data or gain privileged access

Worm: A self-replicating malicious program that spreads across systems without user intervention

Zero-Day Vulnerability: A security flaw in software or hardware that is unknown to the vendor and has no available patch, making it exploitable by attackers

Zero Trust Security: A security model that requires strict identity verification for every person and device trying to access resources, regardless of whether they are inside or outside the network

Still have IT Questions?

SpireTech explains technology in plain English and provides managed IT services for Portland businesses. Trust the locals.