Our comprehensive IT and cybersecurity glossary provides clear definitions of technical terms, industry jargon, and security concepts to help businesses understand the complex world of managed IT services, network security, and cybersecurity protection. Use this resource to better understand the technologies and services that protect your business.
Systems that protect and monitor accounts with high-level access to sensitive systems
Rules that businesses must follow to safely process credit card payments
Personal data that can identify an individual, like name, address, or social security number
A cloud service that provides everything you need to build and deploy applications without managing the infrastructure
A fix for a security problem or bug in software
Updating software with fixes for security holes or bugs
A controlled hacking attempt to find vulnerabilities in your systems before real attackers do
Fake emails or messages that trick you into revealing personal information or clicking dangerous links
A cloud system used by only one organization for greater control and security
Cloud services available to anyone who wants to use or purchase them
Encryption technology that uses the principles of quantum physics to create theoretically unbreakable codes
A security approach that restricts system access based on a user's role in an organization
Technology that lets you control a computer from a different location
Malicious software that locks your files until you pay a ransom
How much data your business can afford to lose in an incident, measured in time
How quickly you need to restore your systems after a disaster
A team of ethical hackers who attack your systems like real hackers would to test your defenses
The process of identifying potential threats and vulnerabilities to determine how to protect your systems
Malicious software that gives attackers deep-level, hidden access to a computer
The device that directs traffic between your network and the internet
A method for sending encrypted and digitally signed emails
Control systems used to monitor and manage industrial equipment and infrastructure
A system that collects and analyzes security data from across your network to detect threats
A hacking technique where attackers insert malicious code into a website's database
A secure way to access and manage remote computers
Security technology that creates an encrypted connection between a web server and a browser
Software you access through the internet instead of installing on your computer
Writing software with security in mind from the start to prevent vulnerabilities
A thorough check of your security measures to identify weaknesses
A powerful computer that provides resources, data, or services to other computers over a network
Technology used by employees without official IT department approval or knowledge
Tricks that manipulate people into giving away sensitive information or access
Unwanted emails or messages, usually sent in bulk
Malicious software that secretly gathers information about you without your knowledge
An attack that targets a business by exploiting vulnerabilities in their suppliers or vendors
A person, event, or circumstance that could harm your systems
Malicious software disguised as something useful or harmless
A security method requiring two different ways to prove your identity
The address of a website or webpage
A secure tunnel for your internet traffic that protects your privacy and can make it appear you're connecting from a different location
Phone service that works over your internet connection instead of traditional phone lines
A weakness or flaw in your systems that could be exploited by attackers
A security system that specifically protects web applications by filtering and monitoring HTTP traffic
Phishing attacks specifically targeting high-level executives or other important people in an organization
An ethical hacker who helps organizations find and fix security problems
Wireless technology that connects your devices to the internet without cables
Malicious software that spreads by itself from computer to computer
A type of attack where malicious scripts are injected into trusted websites
A security approach that treats everyone as untrusted, requiring verification for anyone trying to access your systems, even those already inside your network
An attack that targets a security hole unknown to the software creator and before they can fix it
An infected computer controlled remotely by hackers without the owner's knowledge