ARE WE A MATCH?
Think we’d be a good fit together? Take the quiz and see what it says! (Hint: there are no right or wrong answers.) Why take it? Before we engage, we’d like to know a little more about you. It will get us off on the right foot.
Snap Shots: An IT Blog
Which Firewall Should I Use In My Business?
Which firewall should I use in my business? We work...
An explanation of the new ‘Cybersecurity Maturity Model Certification’ otherwise known as ‘CMMC’
An explanation of the new ‘Cybersecurity Maturity Model Certification’ otherwise...
Why Does My Business Need IT? - An Overview of the Importance of Quality IT.
Why does my business need I.T. ? WHAT IS I.T....
Do You Speak Geek?
We’re often asked if we only “speak geek” or will we answer questions in terms you can understand. That can be tricky, because we don’t want to over simplify. Rather, we want you to understand what we’re doing at all times. This managed IT services glossary will help you understand our language.
Active directory: A Microsoft service that provides a common interface for organizing and maintaining information related to resources connected to a variety of network directories.
Access point: A hardware device that allows a WiFi device to be connected to a wired network.
Advanced persistent threat (APT): A set of stealthy and continuous computer hacking processes, often orchestrated by a person or persons targeting a specific entity.
Application control: Security technology that recognizes good files and blocks bad files passing through any endpoint in an enterprise network.
Antivirus: Software designed to detect and destroy computer viruses.
Backup: The process of copying computer data into an archive file so it may be used to restore the original after a data loss event.
Bandwidth: The amount of data that can be transmitted in a fixed amount of time.
BDR: A backup designated router that becomes the designated router in the event of failure of the primary router.
Cable modem: A type of network bridge that provides bi-directional data communication, such as broadband internet, using radio frequency channels on a hybrid fiber-coaxial (HFC) over glass (RFoG) infrastructure.
Cloud computing: Cloud computing is the delivery of on-demand computing services — from applications to storage and processing power — typically over the internet and on a pay-as-you-go basis.
Cloud services: Software or data services delivered over the internet.
Colocation: A data center facility that rents space for servers and computer hardware. The colocation comprises the building, cooling, power, bandwidth and physical security while the customer provides servers and storage.
Content filtering: Using a program to screen Web pages or e-mail that are deemed objectionable and exclude from them access or availability.
Data encryption: Translation of data into a secret code. This is the most effective way to secure data. A key or password is required to decrypt it.
Dark web: A part of the world wide web that requires special software to access. Once inside, web sites and other services can be accessed through a browser similar to the regular web.
Disaster recovery: A set of policies, tools and procedures that enable the recovery or continuation of your IT systems following a natural or manmade disaster.
DLP: Data loss prevention tools and processes are used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
DSL: Digital subscriber lines are family of technologies that are used to transmit digital data over telephone lines.
Dual factor authentication: An extra layer of security that requires not only a password and username but also something that only the user has, such as an added piece of information or a verification code.
Fiber internet: Any internet access through fiber-optic lines.
Firewall: A system designed to prevent unauthorized access to or from a private network.
Helpdesk: A customer resource for troubleshooting problems.
Hybrid cloud: A cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms.
Hypervisor: A hypervisor is computer software, firmware or hardware that creates and runs virtual machines.
IT systems: A set of computer hardware and software components, system users and data designed for collecting, creating, storing, processing, and distributing information necessary for operating a business.
LAN: A Local Area Network is a computer network that links devices within a building or group of adjacent buildings.
Line of business (LOB) application: One of the set of critical computer applications perceived as vital to running an enterprise.
Load test assessment: A process used to determine a system’s behavior under both normal and peak conditions, so that the maximum operating capacity of an application and any bottlenecks can be identified.
Malware: Shorthand for malicious software that is intended to damage or disable computers and computer systems.
MDM: Master data management is a method used to define and manage the critical data of an organization to provide, with data integration, a single point of reference.
NOC: A network operations center is one or more locations from which network monitoring and control, or network management, is exercised over a computer, telecommunication or satellite network.
Office 365: A line of subscription services offered by Microsoft, as part of the Microsoft Office product line.
Packet: A unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.
QBR: Quarterly business review.
Ransomware: Malware designed to block access to a computer system until a sum of money is paid.
Recovery point objective: The maximum targeted period in which data might be lost from an IT service due to a major incident. The RPO gives systems designers a limit to work to.
Recovery time objective: The targeted duration of time and a service level within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in business continuity.
Remote access: Connection to a data-processing system from a remotelocation, for example, through a remote access service or virtual private network
Router: A networking device that forwards data packets between computer networks.
SAAS: Software as a service.
Single sign-on (SSO) A property of access control that allows a user to login with a single ID and password to gain access to a connected system or systems without using different usernames or passwords.
Spam: The email version of junk mail.
Switch: Small, flat boxes with 4 to 8 Ethernet ports that connect to computers, cable, or DSL modems, and other switches. High-end switches can have more than 50 ports and often are rack mounted.
SysAdmin: A person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers.
Ticket: An electronic work order generated by the help desk containing a unique reference number that allows the user or support staff to locate, add to or communicate the status of the user’s issue or request.
URL Filtering: Controls which websites your employees can access and categories of websites that you want to block.
Virtualization: The fundamental technology that powers cloud computing. It is software that separates physical infrastructures to create various dedicated resources, making it possible to run multiple operating systems and applications simultaneously on the same server.
Virtual Server: A server that shares hardware and software resources with other operating systems versus dedicated servers.
VLAN: A virtual local area network, refers to any broadcast domain that is partitioned and isolated in a computer network at the data link layer (OSI layer 2).
VOIP: Voice-over-internet protocol. VOIP allows for voice communication over the internet, rather than telephone lines.
VPN: A virtual private network extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
Vulnerability Scan: An inspection of the potential points of exploit on a computer or network to identify security holes.
WAN: A Wide Area Network is a computer network in which the computers connected may be far apart, generally having a radius of half a mile or more.