IT Glossary
Technology has enough confusing acronyms. Here's a plain-English guide to the terms you'll hear when talking about managed IT, cybersecurity, cloud, and networking. No decoder ring required.
Access Control
Physical SecuritySecurity measures that determine who can enter specific areas of a building or access certain systems. This includes keycard readers, biometric scanners, and PIN-based locks. At Flyght, we design and install access control systems that integrate with your IT infrastructure so everything talks to everything.
Active Directory (AD)
NetworkingMicrosoft's directory service that manages user accounts, passwords, and permissions across a network. Think of it as the master list of who's allowed to do what on your company's computers. When AD goes down, nobody can log in — which is why we monitor it like hawks.
AES (Advanced Encryption Standard)
CybersecurityThe gold-standard encryption algorithm used worldwide to protect sensitive data. AES-256 is considered unbreakable by current technology. Your bank uses it. The military uses it. Flyght uses it on every backup we manage.
Bandwidth
NetworkingThe maximum amount of data that can be transmitted over a network connection in a given time. More bandwidth means faster speeds for your team. If your internet feels like dial-up during a Zoom call, you've got a bandwidth problem.
BDR (Backup and Disaster Recovery)
Cloud & InfrastructureA comprehensive strategy combining regular data backups with a plan to restore operations after a disaster — whether that's a ransomware attack, a flood, or Dave from accounting deleting the shared drive again. Flyght's BDR solutions mean your business can be back up and running in hours, not weeks.
BYOD (Bring Your Own Device)
IT ManagementA policy allowing employees to use personal smartphones, laptops, and tablets for work. Sounds great in theory until someone's kid downloads malware on the same laptop that has access to your client database. A solid BYOD policy balances flexibility with security.
Cloud Computing
Cloud & InfrastructureDelivering computing services — servers, storage, databases, networking, software — over the internet instead of from hardware in your office. The cloud lets you scale up or down as needed without buying (and maintaining) expensive equipment.
Cloud Migration
Cloud & InfrastructureThe process of moving data, applications, and workloads from on-premise servers to cloud-based infrastructure. Done right, it reduces costs and improves flexibility. Done wrong, it's a nightmare. We've handled enough migrations to know the difference.
Co-Managed IT
IT ManagementA partnership model where an MSP like Flyght works alongside your existing internal IT staff. We fill the gaps — whether that's 24/7 monitoring, cybersecurity expertise, or just backup coverage so your IT person can finally take a vacation.
Compliance
CybersecurityAdhering to regulatory requirements and industry standards that govern how you handle data, privacy, and security. Depending on your industry, this might include HIPAA (healthcare), PCI-DSS (payment processing), or SOC 2 (service organizations). It's not optional, and the fines for getting it wrong are real.
Dark Web Monitoring
CybersecurityContinuously scanning underground internet forums and marketplaces for your company's stolen credentials, data, or intellectual property. If an employee's password shows up on the dark web, you want to know about it before the bad guys use it.
DDoS (Distributed Denial of Service)
CybersecurityAn attack that floods a network or website with so much traffic that it becomes unusable for legitimate users. Imagine a thousand people trying to walk through one doorway at the same time. That's a DDoS attack, except the people are bots and the doorway is your server.
DNS (Domain Name System)
NetworkingThe internet's phone book. DNS translates human-readable domain names (like flyght.support) into the IP addresses computers use to find each other. When DNS goes down, the internet effectively stops working for everyone affected.
EDR (Endpoint Detection and Response)
CybersecurityAdvanced security software that monitors every device (endpoint) on your network for suspicious activity in real time. Unlike basic antivirus that just looks for known threats, EDR uses behavioral analysis to catch new and evolving attacks. It's antivirus on steroids.
Endpoint
IT ManagementAny device that connects to your network — laptops, desktops, smartphones, tablets, printers, even that smart TV in the break room. Every endpoint is a potential entry point for attackers, which is why managing and securing them is a big deal.
Firewall
CybersecurityA network security device (hardware or software) that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Think of it as the bouncer at the door of your network. Flyght deploys and manages enterprise-grade firewalls from Cisco Meraki, Ubiquiti, and Rabbit Run.
Flyght PatternFlyght Original
Flyght ExclusiveThe signature feeling when your technology just works and you don't have to think about it. Symptoms include reduced stress, increased productivity, and the strange sensation of actually enjoying a Monday morning. Side effects may include telling other business owners about your IT provider at dinner parties. Not FDA approved, but highly recommended.
HIPAA (Health Insurance Portability and Accountability Act)
ComplianceFederal law requiring healthcare organizations and their business associates to protect patient health information (PHI). Violations can result in fines up to $1.5 million per incident. Flyght helps healthcare practices across Ohio, Michigan, and Indiana build and maintain HIPAA-compliant IT environments.
Hybrid Cloud
Cloud & InfrastructureAn IT architecture that combines on-premise infrastructure with cloud services, allowing data and applications to move between the two. It gives you the best of both worlds — the control of local servers and the flexibility of the cloud.
IaaS (Infrastructure as a Service)
Cloud & InfrastructureA cloud computing model where you rent virtualized computing resources — servers, storage, networking — from a cloud provider like Microsoft Azure or AWS. You manage the software; they manage the hardware. It's like renting an apartment vs. building a house.
Incident Response
CybersecurityA structured approach to handling a cybersecurity breach or attack. The goal is to limit damage, reduce recovery time, and prevent future incidents. Having a plan before something happens is infinitely better than figuring it out during a 2 AM crisis.
IoT (Internet of Things)
NetworkingThe network of physical devices — sensors, cameras, smart thermostats, connected machinery — that communicate over the internet. IoT devices are incredibly useful and notoriously insecure. Every one of them needs to be accounted for on your network.
IT Assessment
IT ManagementA thorough evaluation of your current technology environment — hardware, software, network, security posture, and workflows. At Flyght, our free IT assessments are the starting point for every new client relationship. No obligation, no sales pitch — just an honest look at where you stand.
Latency
NetworkingThe delay between sending a request and receiving a response over a network. High latency makes video calls choppy, cloud apps sluggish, and remote workers frustrated. It's measured in milliseconds, but when it's bad, it feels like hours.
Managed Detection and Response (MDR)
CybersecurityA managed cybersecurity service that combines technology with human expertise to detect, investigate, and respond to threats 24/7. Unlike basic monitoring that just sends you alerts, MDR actually does something about the threats it finds.
Managed IT Services
IT ManagementThe practice of outsourcing your IT operations to a specialized provider (MSP) who proactively manages, monitors, and maintains your technology environment for a predictable monthly fee. Instead of waiting for things to break, a good MSP prevents problems before they start. That's literally what Flyght does.
MFA (Multi-Factor Authentication)
CybersecurityA security method requiring two or more forms of verification to access an account — typically something you know (password), something you have (phone), or something you are (fingerprint). If you're not using MFA on your business accounts in 2025, we need to talk.
MSP (Managed Service Provider)
IT ManagementA company that remotely manages a customer's IT infrastructure and end-user systems on a proactive basis. That's us. Hi. We're Flyght, and we're an MSP that doesn't suck.
MSSP (Managed Security Service Provider)
CybersecurityAn MSP that specializes in cybersecurity services — threat monitoring, incident response, vulnerability management, and compliance. Flyght operates as both an MSP and MSSP, because separating your IT management from your security is like locking the front door but leaving the windows open.
Network Switch
NetworkingA hardware device that connects devices on a local network and directs data to its intended destination. Managed switches give you control over traffic flow, VLANs, and quality of service. Unmanaged switches just... switch. There's a big difference.
Offboarding
IT ManagementThe IT process of securely removing a departing employee's access to all company systems, devices, and data. Done poorly, it's a massive security risk. Done right, accounts are disabled within minutes of their last day. Flyght handles this as part of our managed IT services.
On-Premise (On-Prem)
Cloud & InfrastructureIT infrastructure that is physically located at your business — servers in a closet, networking equipment in the back room, that one computer under Karen's desk that nobody remembers what it does but everyone's afraid to unplug it.
Patch Management
CybersecurityThe process of regularly updating software and operating systems with security patches and bug fixes. It sounds boring because it is boring. But unpatched systems are the #1 way attackers get in, so boring is important.
Penetration Testing (Pen Test)
CybersecurityA simulated cyberattack against your systems to identify vulnerabilities before real attackers do. Think of it as hiring someone to try to break into your house so you can fix the weak spots. Ethical hacking at its finest.
Phishing
CybersecurityA social engineering attack where criminals send deceptive emails, texts, or messages to trick people into revealing sensitive information or clicking malicious links. Phishing is the #1 cause of data breaches worldwide, and the emails are getting scarily convincing. Employee training is your best defense.
Printer Goes BRRRFlyght Original
Flyght ExclusiveThe official Flyght term for when a printer actually works on the first try. This rare and beautiful phenomenon has been documented exactly 7 times in recorded history. If you're experiencing printer issues (and you are, because everyone is), just know that we feel your pain and we'll fix it anyway.
QBR (Quarterly Business Review)
IT ManagementA strategic meeting between your business and your MSP to review IT performance, discuss upcoming projects, and align technology with business goals. At Flyght, QBRs are when we sit down with you and make sure your technology is working for your business — not the other way around.
RaaS (Ransomware as a Service)
CybersecurityA criminal business model where ransomware developers sell or lease their malware to other criminals. Yes, cybercriminals have subscription models now. Yes, it's as terrifying as it sounds. This is why cybersecurity isn't optional anymore.
Ransomware
CybersecurityMalware that encrypts your files and demands payment (usually cryptocurrency) to unlock them. Even if you pay, there's no guarantee you'll get your data back. The average cost of a ransomware attack for SMBs is over $200,000. A proper backup and security strategy costs a fraction of that.
RMM (Remote Monitoring and Management)
IT ManagementSoftware that allows MSPs like Flyght to monitor and manage your IT systems remotely in real time. RMM tools let us spot problems before they become outages — often before you even notice something's off. It's like having a mechanic who checks your engine every day instead of waiting for it to smoke.
SaaS (Software as a Service)
Cloud & InfrastructureSoftware delivered over the internet on a subscription basis rather than installed locally. Microsoft 365, Google Workspace, Salesforce — all SaaS. You access it through a browser, and the vendor handles updates and maintenance.
SD-WAN (Software-Defined Wide Area Network)
NetworkingA virtual WAN architecture that uses software to intelligently route traffic across multiple connection types (broadband, LTE, MPLS) for better performance and reliability. In plain English: it makes your internet faster and more reliable by using every available connection simultaneously.
SIEM (Security Information and Event Management)
CybersecurityA system that collects and analyzes security data from across your entire IT environment in real time, looking for patterns that indicate a threat. It's like a security camera system for your network, except it watches everything all at once and never takes a break.
SLA (Service Level Agreement)
IT ManagementA contract between an MSP and a client that defines the expected level of service — response times, uptime guarantees, resolution targets. A good SLA holds your IT provider accountable. A great one means they're already exceeding it before you have to check.
SOC (Security Operations Center)
CybersecurityA centralized team of cybersecurity analysts who monitor, detect, and respond to security threats 24/7/365. Flyght's SOC operations ensure that when something suspicious happens on your network at 3 AM, someone is already on it.
Social Engineering
CybersecurityManipulating people into giving up confidential information or access through psychological tricks rather than technical hacking. It's the con artist approach to cybercrime — and it works because humans are trusting by nature. Training your team to recognize these tactics is critical.
SSO (Single Sign-On)
CybersecurityAn authentication method that lets users log in once and access multiple applications without re-entering credentials. Fewer passwords to remember means fewer sticky notes on monitors. Everyone wins.
The Flyght EffectFlyght Original
Flyght ExclusiveWhat happens when you finally switch to an IT provider that gives a damn. Common symptoms include an inbox free of IT emergencies, employees who stop complaining about technology, and the CEO wondering what the IT budget was even for before. Caution: may cause extreme satisfaction and unsolicited referrals.
UCaaS (Unified Communications as a Service)
Cloud & InfrastructureA cloud-based platform that combines voice, video, messaging, and collaboration tools into one solution. Think Microsoft Teams or Zoom — but integrated with your phone system, your CRM, and your sanity.
UPS (Uninterruptible Power Supply)
IT ManagementA battery backup device that provides emergency power when the main power source fails, giving you time to safely shut down equipment or ride out a brief outage. Every server and critical workstation should have one. Toledo weather doesn't ask for permission before knocking out power.
vCIO (Virtual Chief Information Officer)
IT ManagementA strategic technology advisor provided by your MSP who helps align your IT with your business goals. At Flyght, your vCIO develops technology roadmaps, manages IT budgets, evaluates vendors, and attends QBRs — giving you C-level IT leadership without the C-level salary.
VLAN (Virtual Local Area Network)
NetworkingA method of segmenting a physical network into separate logical networks for security and performance. For example, your guest Wi-Fi should be on a different VLAN than your accounting department. If they're not, that's a problem we can fix.
VoIP (Voice over Internet Protocol)
Cloud & InfrastructurePhone service delivered over the internet instead of traditional phone lines. VoIP systems are more flexible, more affordable, and way easier to manage than legacy phone systems. Plus, you can take calls from anywhere — your desk, your phone, or the coffee shop down the street.
VPN (Virtual Private Network)
NetworkingAn encrypted connection that allows remote users to securely access a company's network as if they were physically in the office. Essential for remote and hybrid workforces. Not the same thing as the VPN app people use to watch Netflix from other countries.
Vulnerability Assessment
CybersecurityA systematic review of security weaknesses in your IT environment. Unlike a penetration test, a vulnerability assessment identifies and prioritizes weaknesses without actively exploiting them. Think of it as a health checkup for your network.
WAP (Wireless Access Point)
NetworkingA networking device that allows Wi-Fi devices to connect to a wired network. Enterprise-grade WAPs from Ubiquiti or Cisco Meraki provide better coverage, faster speeds, and more security than the consumer router you bought at Best Buy.
Zero Trust
CybersecurityA security framework that assumes no user, device, or system should be automatically trusted — even if they're inside the network. Every access request is verified, every time. It's the 'trust nobody' approach to cybersecurity, and in 2025, it's the smart one.
57 terms • Last updated March 2026