Skip to page content
Client Hub Tel 01892 830111

IT jargon glossary

Does technology talk have you stumped? Do you switch off when you hear terms like ‘DNS filtering’? Fear not! Our handy IT jargon glossary simplifies IT support terms and services.

BYOD stands for “Bring Your Own Device,” a policy allowing employees to use their personal devices to connect to their organization’s network and access work-related resources.

Is an open language modelling system (AI) owned by Microsoft.

Customer Satisfaction Score

Every time a ticket is resolved, we ask a one question survey, “How did we do on this request?”, so we understand what each end user thinks of the service we have provided. In the industry, anything 98% and over is classed as World Class, and we continually achieve this and often have 100% Customer Satisfaction.

Cyber Essentials

Cyber Essentials is a Government-backed, industry-supported scheme to help organisations protect themselves against 80% of common cyber-attacks. It includes a series of annual checks and technical controls to ensure you are efficiently protected against cyber threats, including hacking, phishing or password attacks. To pass the certification, you will need evidence in support of your answers.

Find out more about how we can get you Cyber Essentials certified.

Dark Web Monitoring

The Dark Web is a layer of the Internet, accounting for 6% of the total Internet, that is accessible via specialist browsers. The Dark Web is considered a haven for criminal activity, from the sharing of illegal information to the sale of arms and drugs. Company credentials that are stolen or leaked will find its way onto the dark web, whether freely shared or sold in market places. Employees often use the same password for multiple services on the web, such as CRM, e-commerce sites, and social media exponentially increasing the risk and impact of any breach.

Dark Web Monitoring keeps a close eye on whether your business data is available on the Dark Web, provides you with daily updates of any accounts that are exposed so you can take immediate action averting any threat.

Find out more about our Dark Web Monitoring service.

The Digital Visual Interface (DVI) has three variants DVI-A, DVI-D and DVI-I. There is also the Mini-DVI and Micro-DVI, but these were largely used on early Apple computers. The DVI created in 1999 to supersede the VGA, moved connections from analogue to digital allowing for better picture quality. This connection was superseded quickly and therefore is not as commonly found today.

More information about display ports.

Another widely used connection, it is primarily used to connect a video source to a display device. It’s ability to deliver high-quality video and audio makes it a very popular connection type for professionals and gamers.

There are three core variants; DP 1.2, DP 1.3 and DP 1.4. Each type has slightly different capabilities.

More information about display ports.

DNS filtering

DNS (Domain Name System) filtering refers to the process of using DNS to block or redirect specific domain names or internet addresses. This can be done at the network level to prevent access to certain websites or online services, or to redirect traffic to a different location.

DNS filtering is often used to block access to known malicious or unwanted websites, such as those used for phishing or distributing malware.

GIFShell represents a novel attack method where attackers can transmit malicious files, execute commands, and carry out data exfiltration through GIF images.

A Graphical User Interface (GUI) is a type of digital interface that allows users to interact with electronic devices through graphical elements like icons, buttons, and menus.

The High-Definition Multimedia Interface (HDMI) connection has been going strong since 2002. It’s ability to transmit high-definition uncompressed video data between devices is the reason everyone swiped right on this connection!

Its developed over the years, becoming smaller and smaller.

More information about display ports.

ISO 27001

This is the only auditable international standard that defines the requirements of an information security management system (ISMS). An ISMS is a set of policies, procedures, processes and systems that manage information risks, such as cyber-attacks, hacks, data leaks or theft. Learn more about ISO 27001.

ISO 9001

This certification ensures that a quality management system is in place. The system must meet certain criteria, including strong customer focus, the motivation and implication of top management, the process approach and continual improvement. Learn more about ISO 9001.

Multi-Factor Authentication (MFA), sometimes call 2FA, is an additional layer of security when accessing accounts. Found on most accounts now, from Facebook, X (formerly Twitter), LinkedIn and Microsoft. This process requires you to type in your password AND then authenticate that you are allowing access. This can be done via email, SMS or via an Authenticator application, such as Microsoft Authenticator or Google Authenticator.

Onsite support

Onsite IT support is when technical assistance and troubleshooting services are given to computer users at the office or place of work. This can include setting up new equipment, troubleshooting and repairing hardware and software issues.

OSINT is an acronym for Open Source Intelligence. Essentially gathering and using information freely scattered about the interweb. More information on how OSINT can support your business security strength.

Patch Management

Patch management is the process of identifying, downloading, testing, and installing software updates and fixes, commonly known as “patches”, in order to keep software programs and operating systems up-to-date and secure. These patches address security vulnerabilities, fix bugs, and add new features. Patch management typically includes a combination of automated and manual processes.

Effective patch management can help prevent security breaches by closing vulnerabilities that could be exploited by attackers. It can also help keep software running smoothly by addressing bugs and compatibility issues.

Quarterly Assessment

Every 3 months our proactive insights and alignment teams will carry out a risk assessment in order to reduce risk and downtime while optimising the IT. They ask the question “what more could we have done to prevent this ticket being needed?”. By analysing, problem-solving and automating on a regular basis ensures customer issues are reduced through Continual Service Improvement (CSI).

A slightly contrived acronyms that businesses all love so much. For more information read about STEP.

Technical Account Manager

A Technical Account Manager (TAM) acts as a liaison between the customer and the IT provider. The TAM is responsible for ensuring that the company’s technical needs are met and that the services provided by the technical teams are of high quality and align with the company’s goals and objectives. The TAM also acts as a primary point of contact for the company for any technical issues or concerns, and works closely with the company to ensure that all technical matters are handled efficiently and effectively.

USB-C is the newest connector available, driven by regulation and reducing costs, is now becoming the standard connection. USB-C is capable of data, video, audio and power transfer. Most new devices will utilise this cable, including future apple devices.

More information about display ports.

Virtualization is technology that you can use to create virtual representations of servers, storage, networks, and other physical machines.

Ahh, Video Graphics Array (VGA), nostalgia kicking in now. This connection has been around since 1987, and is extremely common (even today), found on monitors, televisions, projectors and PCs. VGA is an analogue connection, and therefore it has a limited ability to transmit high-definition content. Modern devices are beginning to drop this connection type for newer connectors that are able to transmit high-def content.

More information about display ports.

Contact Us