Managed IT Service Terms and Definitons

A

Access and logins: The username and password used to access a specific account in a software.

Access Point: A device that you connect to a wired network through the Ethernet port, allowing wireless devices to connect to the network.

Azure: Azure is Microsoft’s cloud platform, a collection of integrated services that help developers build, test, deploy and manage applications and services through Microsoft-managed data centers.

B

Backup: An exact copy of the current state of your files, kept in a secure location in case of emergency. Often these are refreshed periodically.

Behavioral analytics: The science of behavior. In IT support, it is used to determine the best human-friendly design for a program or system.

C

Cable: A collection of metal wires surrounded by rubber or plastic, with the purpose of allowing the flow of electricity or information.

Cabling: The process and practice of hooking up the many cables needed for a network.

Cell phone: A small device that allows access to phone and internet. Many these days also take photos.

Central file storage: A single, consistent set of data that is shared between the many devices on a network. This is opposed to having different files stored separately on each device.

Cloud computing / Cloud computing services: Instead of storing data, software, networks, and analytics locally, cloud computing stores them on the internet ("the cloud"). This is advantageous because it lessens the chance of data being destroyed. It is also more affordable because you typically only pay for services used.

Computer cleanup: The process of compacting, deleting, and defragging old files in order to make your computer run faster.

Computer services: Computer services includes, but is not limited to, electronic computer repair services, computer programming services, computer sales agencies or resellers, computer training schools or institutes, computer facilities management services, and data processing services. The term "computer services" does not include the sale of computers or other hardware.

Consultation: A one-on-one session where we discuss your business' IT support needs.

Continuity-As-A-Service: A service where we make sure the customer and employee experience is continuous and consistent across platforms.

Corrupted file: A computer file that has been damaged in some way and no longer works.

Cyber crime: An illegal act (usually data or identity theft) that occurs over the internet.

Cyberattack: A targeted attack by hackers over the internet, usually used to steal data, shut down operations, or commit other information-related crimes.

D

Data: Either one piece or many pieces of information. Usually numbers.

Data breach: An instance where data has been stolen or leaked in some way, usually to people with nefarious intent.

Data loss prevention: There are many ways to lose data. Data loss prevention provides a set of tools and processes for ensuring that sensitive data is not stolen, destroyed, corrupted, or damaged in any way.

Dead spot: An area of a building that wifi does not reach.

DDoS protection: DDos (distributed denial of service) attacks make websites inaccessible by overwhelming them with traffic from multiple sources. DDoS protection makes sure that spam traffic does not harm your website.

E

E-commerce: Goods sold online.

Email:Email is a system of sending messages electronically over the internet.

Encryption: Encryption is the process of scrambling data so only those who are authorized can unscramble it.

Error messages: A popup that comes up on your computer when something has gone wrong. Usually these contain helpful information to determine the reason for malfunction.

Ethernet: A wired connection to the internet (as opposed to a wireless connection, such as wifi)

F

Firewall: A firewall protects your computer from incoming threats. A successful attempt at penetrating a firewall could result in the loss or theft of data.

G

Google Docs: A cloud-based software that Google offers, where you can store anything from photos, to spreadsheets, to text documents.

Guest Devices: A device that non-employees can use to access your services. These are most often tablets, but can be anything from phones to pagers.

H

Hacker: An individual (usually criminal) who uses computers to gain access to information or systems.

Hard disk / Hard Drive: A hard drive, or hard disk drive, is a data storage device used to store and retrieve digital information using rapidly rotating disks (platters) coated with magnetic material.

Hardware: Hardware is any physical computer equipment such as monitors, cables, and everything inside the computer that makes it tick.

Help desk: If technology isn't working, call our help desk. It is our customer service outlet to assist you in making sure everything's in running order.

HIPAA compliance: The Health Insurance Portability and Accountability Act (HIPAA) is a set of rules that define how  medical records are to be treated, used and shared. The basic rule: These records should not be easily accessible by anyone who isn't the patient or on the patients medical care team.

Hourly IT Services: IT Services provided by the hour (as opposed to monthly flat fee)

I

Identity theft: Identity theft is when someone uses your personal information, like your name and social security number, without your permission, to commit fraud or other crimes.

In-house: In the context of a business, doing something "in house" means it is taken care of by one of your employees (as opposed to hiring an independent contractor or IT management service)

Index: Computer index is a data structure that encourages efficient retrieval of records from a database file.

Individual application security: Security taken at the individual level that aims to avoid compromising the information in the current application being used.

Internet:The internet is a worldwide system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government servers.

Internet provider: A company that provides the services needed to access or use the internet, such as broadband and web hosting.

IT Consulting: We help clients develop strategies that align with their business processes, embrace new technologies and integrate with the larger IT environment.

IT security audits: An IT security audit is performed to assess the security of network devices, software, and computer systems from unauthorized access or attack.

It Services: IT services is an umbrella term that covers installation, configuration, troubleshooting, repair, maintenance, and use of hardware, software or networking systems.

IT Technician: IT technicians are responsible for both software and hardware problems at a business. They provide regular technical support to the company and its clients, including diagnosing system errors, creating and monitoring backups, updating software, and troubleshooting hardware issues.

J

JPEG: A type of file used to store an image.

K

L

LAN Cable: Also known as a network cable, Local Area Network cable, or "that thing from the desk to the router." A LAN cable connects two devices so they can share information over a hard connection (as opposed to over wifi).

Laptop: A computer, monitor and keyboard device that you are able to fold up and take on the go.

Loading speed: How long it takes for all the content on a page to appear. The faster, the better.

M

Malware: Malware is any software that is designed to damage or disrupt a computer.

Managed IT Services: Services performed by a third-party provider are called managed services. Managed IT services are services where the company you outsource to assists you with managing your information technology.

Mobile phone: A mobile or cellular phone is a portable telephone that can make and receive calls over an area. Nowadays mobile phones also take photos, browse the internet, hold songs, and run apps.

Mobile safety: Mobile security is a system for protecting smartphones, tablets, laptops and other portable devices from hackers.

Modem: A modem is an electronic device that converts digital data signals into modulated analog signals suitable for transmission over analog telecommunications circuits.

Monitor: The display screen for a computer.

N

Network: Any network is a connection of multiple units to each other that allows them to pass resources among themselves. A computer network specifically is a connection of multiple computer devices to each other. This connection may be hardwired through cables, or over the internet through wifi.

Network security: Network security is a broad concept of computer network safety and security which focuses on preventing harm caused by hostile exploitation of vulnerabilities. The purpose of network security is to protect network resources and the confidentiality, integrity and availability of data in the computing environment.

Network segmentation: A tool used to keep computer networks fast and secure: network segmentation is a way to divide a whole office's network into separate units within a whole.

O

Optimized: In the world of IT support, being "optimized" means being as good as possible at the goal (speed, security, etc).

P

Patch management: To keep systems safe and secure, it is important to apply updates (patches) as they become available. These updates can fix errors in the software, making it easier for system administrators to secure their networks.

Patch Panel: A patch panel is essentially an array of ports on one panel. Each port connects, via a patch cable, to another port located elsewhere in your building.

PCI compliant: PCI stands for "Payment Card Industry" and is generally shorthand for "Payment Card Industry Data Security Standards" (PCI DSS). It is a set of rules that regulate how sensitive payment information, such as a credit card number, is passed from vendor to processor and back.

POS systems: Short for "Point of sale", a POS system is a device that is able to scan or input items at checkout and then charge the customer for them. It is typically operated by a cashier or salesperson, although "self checkout" has become an increasingly popular method.

Printer network: The connection of printers and computers within a building or organization.

Platform: This isn't just something you stand on! A platform is a software that is used by many individuals for their own purposes. For example, Facebook is a platform.

Q

R

Recovery: The process of getting back lost or damaged data.

Remote work: Instead of going to the office, remote work can be done anywhere the worker wants to be (usually at home in pjs). This offers many benefits, but also a few downsides.

Repeater: A repeater (also known as extender or booster) is a device that takes a wifi signal and amplifies it so that the wifi can reach farther.

Residential repair: Computer repair done for one person or family in their home.

ROI: Short for "return on investment". This is a business term that relates how much money you get back from what you put in.

Router: A  router is a networking device that forwards data packets between computer networks. Such packets could include those used for Internet Protocol (IP) based communications, such as for VoIP and the Web. The most familiar type of routers are home and small office routers that facilitate connections within an area like a local area network (LAN).

S

Security: The measures in place that make sure a hacker can't steal information.

Sensitive information: Information that could be potentially damaging in the wrong hands. This includes identifiers such as first and last name, birthday, credit card or bank details, medical information, and even company trade secrets.

Server: Have you ever wondered where the internet is located? The data lives on servers.

Web servers, which serve up web pages and content, are by far the most common type of server in use today. This is where you'll find the machine (or machines) storing the data that runs your website.

Slack: A communication platform commonly used by work teams.

Software: Software is a set of computer programs and related data that provide the instructions for telling a computer what to do and how to do it.

Software training: Employee training that teaches them how to best use a software.

Spam: Unrelenting and unwelcome messages, often trying to sell something. Spam is sent out by bots to thousands of people.

System: This could mean many things, depending on the context. In regards to IT, when we say "system" we usually mean a computer system.

Subscription Software: A computer service that runs on a subscription basis.

Switch: Network switches are used to connect computers together.

Software Failure: When a program you're using crashes or does not work.

Server room: A room full of servers that hold information.

T

Ticket: A request for support from a customer.

Ticketing System: The system that receives, sorts, and dispatches ticket requests.

Trojan Horse: A virus that disguises itself as a helpful program in order to sneak its way into your computer.

U

Update: A new version of software, often fixing old bugs and security vulnerabilities.

USB: Also called a "jump drive" or a "thumb drive", a USB is a small and portable storage device used for photos, videos, documents, and other files.

V

Video Conferencing: Meeting via video. Usually using platforms like Zoom, Skype, or Microsoft Teams.

Virtualization: The process of moving your business information and systems on to a computer or online. Instead of paper files, for example.

VoIP: It’s like talking on the phone, but instead of using a dialup connection, it uses an internet connection.

W

Website security: Website security protects you from people who try to steal your stuff online.

Window: The display of the program that you have open. Often, you can have multiple windows open on your computer. You can minimize or exit them as needed.

Windows 365: A suite of programs that is tailored for business owners. Eugene IT specializes in helping small businesses get the most out of their Windows 365 subscriptions!

Wireless (networking): lA connection made wirelessly, either over wifi or bluetooth.

WiFi: A way to connect your computer or smartphone to the internet without wires.

Windows: A brand of computer operating system. Most people use either Windows (PC) or Mac.

Workflow management software: A software that helps to outline workflows, coordinate teams, and keep your business running efficiently.

Worm: A worm is a new kind of virus that copies itself on computers and then spreads from computer to computer.

X

Y

Z

Leave a Comment

Your email address will not be published. Required fields are marked *