IT Glossary

Definitions and Small Business IT Guide

  • Information Technology (IT) – The use of computers, software, networks, and data to support business operations.
  • IT Infrastructure – The hardware, software, networks, and facilities required to operate IT services.
  • Cloud Computing – On-demand delivery of computing resources over the internet.
  • Public Cloud – Cloud services shared across multiple customers.
  • Private Cloud – Dedicated cloud infrastructure for a single organization.
  • Hybrid Cloud – Combination of public and private cloud environments.
  • Multi-Cloud – Use of multiple cloud providers simultaneously.
  • Edge Computing – Processing data closer to where it is generated to reduce latency.
  • Virtualization – Running multiple virtual systems on a single physical machine.
  • Infrastructure as Code (IaC) – Managing infrastructure using code instead of manual setup.
  • Network – Interconnected devices that share data and resources.
  • LAN (Local Area Network) – Network within a limited area (office, building).
  • WAN (Wide Area Network) – Network covering a large geographic area.
  • SD-WAN – Software-defined approach to managing wide-area networks.
  • VPN (Virtual Private Network) – Encrypted connection over the internet to a private network.
  • Bandwidth – Maximum data transfer capacity of a network.
  • Latency – Delay in data transmission.
  • Firewall – Security system that filters network traffic.
  • Cybersecurity – Protection of systems, networks, and data from digital attacks.
  • Zero Trust – Security model that assumes no user or device is trusted by default.
  • Identity and Access Management (IAM) – Controls who can access systems and data.
  • Multi-Factor Authentication (MFA) – Login method requiring multiple verification factors.
  • Endpoint Detection and Response (EDR) – Security monitoring for devices like laptops and servers.
  • Extended Detection and Response (XDR) – Unified threat detection across multiple environments.
  • Managed Detection and Response (MDR) – Outsourced 24/7 cybersecurity monitoring.
  • Phishing – Fraudulent attempts to steal sensitive information via email or messages.
  • Ransomware – Malware that encrypts data and demands payment for release.
  • Data Encryption – Converting data into unreadable code to prevent unauthorized access.
  • Post-Quantum Cryptography – Encryption designed to resist future quantum computing attacks.
  • Cloud-Native – Applications designed specifically for cloud environments.
  • Container – Lightweight package containing an application and its dependencies.
  • Kubernetes – Platform for managing containerized applications.
  • Serverless Computing – Running code without managing servers.
  • Microservices – Application architecture using small, independent services.
  • API (Application Programming Interface) – Interface allowing software systems to communicate.
  • DevOps – Practices combining software development and IT operations.
  • DevSecOps – DevOps with integrated security practices.
  • CI/CD (Continuous Integration / Continuous Deployment) – Automated software testing and release pipeline.
  • GitOps – Managing infrastructure and deployments using Git repositories.
  • Site Reliability Engineering (SRE) – Engineering discipline focused on system reliability.
  • Patch Management – Updating systems to fix bugs and security vulnerabilities.
  • Data Governance – Policies for managing data availability, quality, and security.
  • Business Intelligence (BI) – Tools that analyze data to support decision-making.
  • Observability – Ability to understand system behavior through logs, metrics, and traces.
  • Logging – Recording system events for troubleshooting and audits.
  • Monitoring – Tracking system health and performance.
  • Data Backup – Copying data to protect against loss.
  • Disaster Recovery (DR) – Plan to restore IT systems after major disruptions.
  • Artificial Intelligence (AI) – Systems that perform tasks requiring human intelligence.
  • Machine Learning (ML) – AI systems that learn patterns from data.
  • Generative AI – AI that creates text, images, code, or audio.
  • Large Language Model (LLM) – AI model trained on vast amounts of text data.
  • Retrieval-Augmented Generation (RAG) – AI technique combining document search with LLM responses.
  • AIOps – Using AI to automate IT operations and incident response.
  • MLOps – Practices for deploying and managing machine learning models.
  • Automation – Using technology to perform tasks with minimal human intervention.
  • IT Governance – Framework for aligning IT with business goals.
  • IT Service Management (ITSM) – Processes for delivering and supporting IT services.
  • Service Level Agreement (SLA) – Contract defining expected service performance.
  • SLI / SLO – Metrics and targets used to measure service reliability.
  • FinOps – Financial management of cloud spending.
  • Compliance – Meeting regulatory and legal IT requirements (HIPAA, GDPR, PCI, etc.).
  • Risk Management – Identifying and mitigating IT-related risks.
  • Confidential Computing – Protecting data while it is being processed.
  • Zero Trust Network Access (ZTNA) – Secure application access without traditional VPNs.
  • Secure Access Service Edge (SASE) – Cloud-based networking and security model.
  • Digital Transformation – Strategic use of IT to improve business processes.
  • IT Resilience – Ability of systems to withstand and recover from disruptions.
  • Technical Debt – Long-term cost of choosing quick or outdated technical solutions.

Core IT Basics (Small Business Essentials)

  • Information Technology (IT) – Technology used to run daily business operations, including computers, software, and networks.
  • IT Infrastructure – All the technology that keeps your business running (devices, internet, cloud services).
  • Cloud Computing – Using internet-based services instead of owning servers.
  • Software as a Service (SaaS) – Subscription software accessed through a browser (email, accounting, CRM).
  • Managed IT Services – Outsourcing IT support and maintenance to a third-party provider.
  • IT Support / Help Desk – Assistance for technology issues affecting employees.
  • Digital Transformation – Using technology to improve business efficiency and customer experience.

Devices & End-User Computing

  • Endpoint – Any employee device that connects to company systems (laptop, phone, tablet).
  • Device Management (MDM) – Central control of company devices, updates, and security settings.
  • Bring Your Own Device (BYOD) – Allowing employees to use personal devices for work.
  • Patch Management – Keeping systems updated to fix bugs and security issues.
  • Remote Work Technology – Tools that allow employees to work securely from anywhere.

Networking & Connectivity

  • Business Internet – Dedicated, reliable internet service for company operations.
  • Local Area Network (LAN) – Network connecting devices within an office.
  • Wi-Fi Security – Protecting wireless networks with encryption and passwords.
  • Firewall – Digital barrier that blocks unauthorized access to business systems.
  • Virtual Private Network (VPN) – Secure remote access to company systems.
  • Zero Trust Network Access (ZTNA) – Secure access to specific apps without exposing the full network.

Cybersecurity (High-Impact for SMBs)

  • Cybersecurity – Protecting business data and systems from attacks.
  • Multi-Factor Authentication (MFA) – Extra login step beyond passwords.
  • Identity and Access Management (IAM) – Controlling who can access business systems.
  • Endpoint Detection and Response (EDR) – Security software that monitors employee devices.
  • Managed Detection and Response (MDR) – Outsourced 24/7 cybersecurity monitoring.
  • Phishing – Scam messages designed to steal login information.
  • Ransomware – Malware that locks business data until a ransom is paid.
  • Data Encryption – Protecting sensitive information by making it unreadable to attackers.
  • Security Awareness Training – Educating employees on cybersecurity risks.
  • Zero Trust – Security approach that verifies every user and device before granting access.

Data Protection & Recovery

  • Data Backup – Copies of business data stored separately for recovery.
  • Cloud Backup – Backups stored securely off-site in the cloud.
  • Disaster Recovery (DR) – Plan for restoring IT systems after outages or attacks.
  • Business Continuity – Ensuring operations continue during disruptions.
  • Immutable Backup – Backup data that cannot be altered or deleted.
  • Data Retention Policy – Rules for how long data is stored.

Cloud & Applications

  • Cloud-First Strategy – Choosing cloud solutions before on-premise systems.
  • Cloud-Native Applications – Software built specifically for cloud environments.
  • Application Programming Interface (API) – Allows different software tools to connect.
  • Integration – Connecting business systems so data flows automatically.
  • Serverless Computing – Running applications without managing servers.

Operations, Automation, & Productivity

  • Business Process Automation – Using technology to automate repetitive tasks.
  • Workflow Automation – Automated approvals and task routing.
  • Low-Code / No-Code Tools – Tools that allow non-technical users to build apps or automations.
  • IT Service Management (ITSM) – Managing IT requests and incidents efficiently.
  • Monitoring – Tracking system uptime and performance.
  • Observability – Understanding why systems fail or slow down.

AI & Smart Technology (SMB-Ready)

  • Artificial Intelligence (AI) – Technology that mimics human decision-making.
  • Generative AI – AI that creates content such as text, images, or code.
  • AI Assistant – AI tool that helps with support, writing, or research tasks.
  • Retrieval-Augmented Generation (RAG) – AI that answers questions using company documents.
  • AIOps – AI-driven IT operations and issue detection.
  • AI Governance – Rules for safe and responsible AI use in the business.

IT Management & Cost Control

  • IT Budgeting – Planning and tracking technology spending.
  • FinOps – Managing and optimizing cloud costs.
  • Service Level Agreement (SLA) – Performance commitments from IT vendors.
  • Vendor Management – Overseeing third-party technology providers.
  • Technology Lifecycle Management – Planning for upgrades and replacements.
  • Technical Debt – Future cost caused by outdated or quick-fix IT solutions.

Compliance & Risk (SMB-Relevant)

  • Compliance – Meeting legal or industry IT requirements.
  • Data Privacy – Protecting customer and employee information.
  • Risk Assessment – Identifying and reducing technology risks.
  • Audit Readiness – Being prepared for customer or regulatory reviews.
  • Cyber Insurance – Insurance coverage for cyber incidents.