Flyght
Terminology

IT Glossary

Technology has enough confusing acronyms. Here's a plain-English guide to the terms you'll hear when talking about managed IT, cybersecurity, cloud, and networking. No decoder ring required.

A

Access Control

Physical Security

Security measures that determine who can enter specific areas of a building or access certain systems. This includes keycard readers, biometric scanners, and PIN-based locks. At Flyght, we design and install access control systems that integrate with your IT infrastructure so everything talks to everything.

Active Directory (AD)

Networking

Microsoft's directory service that manages user accounts, passwords, and permissions across a network. Think of it as the master list of who's allowed to do what on your company's computers. When AD goes down, nobody can log in — which is why we monitor it like hawks.

AES (Advanced Encryption Standard)

Cybersecurity

The gold-standard encryption algorithm used worldwide to protect sensitive data. AES-256 is considered unbreakable by current technology. Your bank uses it. The military uses it. Flyght uses it on every backup we manage.

B

Bandwidth

Networking

The maximum amount of data that can be transmitted over a network connection in a given time. More bandwidth means faster speeds for your team. If your internet feels like dial-up during a Zoom call, you've got a bandwidth problem.

BDR (Backup and Disaster Recovery)

Cloud & Infrastructure

A comprehensive strategy combining regular data backups with a plan to restore operations after a disaster — whether that's a ransomware attack, a flood, or Dave from accounting deleting the shared drive again. Flyght's BDR solutions mean your business can be back up and running in hours, not weeks.

BYOD (Bring Your Own Device)

IT Management

A policy allowing employees to use personal smartphones, laptops, and tablets for work. Sounds great in theory until someone's kid downloads malware on the same laptop that has access to your client database. A solid BYOD policy balances flexibility with security.

C

Cloud Computing

Cloud & Infrastructure

Delivering computing services — servers, storage, databases, networking, software — over the internet instead of from hardware in your office. The cloud lets you scale up or down as needed without buying (and maintaining) expensive equipment.

Cloud Migration

Cloud & Infrastructure

The process of moving data, applications, and workloads from on-premise servers to cloud-based infrastructure. Done right, it reduces costs and improves flexibility. Done wrong, it's a nightmare. We've handled enough migrations to know the difference.

Co-Managed IT

IT Management

A partnership model where an MSP like Flyght works alongside your existing internal IT staff. We fill the gaps — whether that's 24/7 monitoring, cybersecurity expertise, or just backup coverage so your IT person can finally take a vacation.

Compliance

Cybersecurity

Adhering to regulatory requirements and industry standards that govern how you handle data, privacy, and security. Depending on your industry, this might include HIPAA (healthcare), PCI-DSS (payment processing), or SOC 2 (service organizations). It's not optional, and the fines for getting it wrong are real.

D

Dark Web Monitoring

Cybersecurity

Continuously scanning underground internet forums and marketplaces for your company's stolen credentials, data, or intellectual property. If an employee's password shows up on the dark web, you want to know about it before the bad guys use it.

DDoS (Distributed Denial of Service)

Cybersecurity

An attack that floods a network or website with so much traffic that it becomes unusable for legitimate users. Imagine a thousand people trying to walk through one doorway at the same time. That's a DDoS attack, except the people are bots and the doorway is your server.

DNS (Domain Name System)

Networking

The internet's phone book. DNS translates human-readable domain names (like flyght.support) into the IP addresses computers use to find each other. When DNS goes down, the internet effectively stops working for everyone affected.

E

EDR (Endpoint Detection and Response)

Cybersecurity

Advanced security software that monitors every device (endpoint) on your network for suspicious activity in real time. Unlike basic antivirus that just looks for known threats, EDR uses behavioral analysis to catch new and evolving attacks. It's antivirus on steroids.

Endpoint

IT Management

Any device that connects to your network — laptops, desktops, smartphones, tablets, printers, even that smart TV in the break room. Every endpoint is a potential entry point for attackers, which is why managing and securing them is a big deal.

F

Firewall

Cybersecurity

A network security device (hardware or software) that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Think of it as the bouncer at the door of your network. Flyght deploys and manages enterprise-grade firewalls from Cisco Meraki, Ubiquiti, and Rabbit Run.

Flyght PatternFlyght Original

Flyght Exclusive

The signature feeling when your technology just works and you don't have to think about it. Symptoms include reduced stress, increased productivity, and the strange sensation of actually enjoying a Monday morning. Side effects may include telling other business owners about your IT provider at dinner parties. Not FDA approved, but highly recommended.

H

HIPAA (Health Insurance Portability and Accountability Act)

Compliance

Federal law requiring healthcare organizations and their business associates to protect patient health information (PHI). Violations can result in fines up to $1.5 million per incident. Flyght helps healthcare practices across Ohio, Michigan, and Indiana build and maintain HIPAA-compliant IT environments.

Hybrid Cloud

Cloud & Infrastructure

An IT architecture that combines on-premise infrastructure with cloud services, allowing data and applications to move between the two. It gives you the best of both worlds — the control of local servers and the flexibility of the cloud.

I

IaaS (Infrastructure as a Service)

Cloud & Infrastructure

A cloud computing model where you rent virtualized computing resources — servers, storage, networking — from a cloud provider like Microsoft Azure or AWS. You manage the software; they manage the hardware. It's like renting an apartment vs. building a house.

Incident Response

Cybersecurity

A structured approach to handling a cybersecurity breach or attack. The goal is to limit damage, reduce recovery time, and prevent future incidents. Having a plan before something happens is infinitely better than figuring it out during a 2 AM crisis.

IoT (Internet of Things)

Networking

The network of physical devices — sensors, cameras, smart thermostats, connected machinery — that communicate over the internet. IoT devices are incredibly useful and notoriously insecure. Every one of them needs to be accounted for on your network.

IT Assessment

IT Management

A thorough evaluation of your current technology environment — hardware, software, network, security posture, and workflows. At Flyght, our free IT assessments are the starting point for every new client relationship. No obligation, no sales pitch — just an honest look at where you stand.

L

Latency

Networking

The delay between sending a request and receiving a response over a network. High latency makes video calls choppy, cloud apps sluggish, and remote workers frustrated. It's measured in milliseconds, but when it's bad, it feels like hours.

M

Managed Detection and Response (MDR)

Cybersecurity

A managed cybersecurity service that combines technology with human expertise to detect, investigate, and respond to threats 24/7. Unlike basic monitoring that just sends you alerts, MDR actually does something about the threats it finds.

Managed IT Services

IT Management

The practice of outsourcing your IT operations to a specialized provider (MSP) who proactively manages, monitors, and maintains your technology environment for a predictable monthly fee. Instead of waiting for things to break, a good MSP prevents problems before they start. That's literally what Flyght does.

MFA (Multi-Factor Authentication)

Cybersecurity

A security method requiring two or more forms of verification to access an account — typically something you know (password), something you have (phone), or something you are (fingerprint). If you're not using MFA on your business accounts in 2025, we need to talk.

MSP (Managed Service Provider)

IT Management

A company that remotely manages a customer's IT infrastructure and end-user systems on a proactive basis. That's us. Hi. We're Flyght, and we're an MSP that doesn't suck.

MSSP (Managed Security Service Provider)

Cybersecurity

An MSP that specializes in cybersecurity services — threat monitoring, incident response, vulnerability management, and compliance. Flyght operates as both an MSP and MSSP, because separating your IT management from your security is like locking the front door but leaving the windows open.

N

Network Switch

Networking

A hardware device that connects devices on a local network and directs data to its intended destination. Managed switches give you control over traffic flow, VLANs, and quality of service. Unmanaged switches just... switch. There's a big difference.

O

Offboarding

IT Management

The IT process of securely removing a departing employee's access to all company systems, devices, and data. Done poorly, it's a massive security risk. Done right, accounts are disabled within minutes of their last day. Flyght handles this as part of our managed IT services.

On-Premise (On-Prem)

Cloud & Infrastructure

IT infrastructure that is physically located at your business — servers in a closet, networking equipment in the back room, that one computer under Karen's desk that nobody remembers what it does but everyone's afraid to unplug it.

P

Patch Management

Cybersecurity

The process of regularly updating software and operating systems with security patches and bug fixes. It sounds boring because it is boring. But unpatched systems are the #1 way attackers get in, so boring is important.

Penetration Testing (Pen Test)

Cybersecurity

A simulated cyberattack against your systems to identify vulnerabilities before real attackers do. Think of it as hiring someone to try to break into your house so you can fix the weak spots. Ethical hacking at its finest.

Phishing

Cybersecurity

A social engineering attack where criminals send deceptive emails, texts, or messages to trick people into revealing sensitive information or clicking malicious links. Phishing is the #1 cause of data breaches worldwide, and the emails are getting scarily convincing. Employee training is your best defense.

Printer Goes BRRRFlyght Original

Flyght Exclusive

The official Flyght term for when a printer actually works on the first try. This rare and beautiful phenomenon has been documented exactly 7 times in recorded history. If you're experiencing printer issues (and you are, because everyone is), just know that we feel your pain and we'll fix it anyway.

Q

QBR (Quarterly Business Review)

IT Management

A strategic meeting between your business and your MSP to review IT performance, discuss upcoming projects, and align technology with business goals. At Flyght, QBRs are when we sit down with you and make sure your technology is working for your business — not the other way around.

R

RaaS (Ransomware as a Service)

Cybersecurity

A criminal business model where ransomware developers sell or lease their malware to other criminals. Yes, cybercriminals have subscription models now. Yes, it's as terrifying as it sounds. This is why cybersecurity isn't optional anymore.

Ransomware

Cybersecurity

Malware that encrypts your files and demands payment (usually cryptocurrency) to unlock them. Even if you pay, there's no guarantee you'll get your data back. The average cost of a ransomware attack for SMBs is over $200,000. A proper backup and security strategy costs a fraction of that.

RMM (Remote Monitoring and Management)

IT Management

Software that allows MSPs like Flyght to monitor and manage your IT systems remotely in real time. RMM tools let us spot problems before they become outages — often before you even notice something's off. It's like having a mechanic who checks your engine every day instead of waiting for it to smoke.

S

SaaS (Software as a Service)

Cloud & Infrastructure

Software delivered over the internet on a subscription basis rather than installed locally. Microsoft 365, Google Workspace, Salesforce — all SaaS. You access it through a browser, and the vendor handles updates and maintenance.

SD-WAN (Software-Defined Wide Area Network)

Networking

A virtual WAN architecture that uses software to intelligently route traffic across multiple connection types (broadband, LTE, MPLS) for better performance and reliability. In plain English: it makes your internet faster and more reliable by using every available connection simultaneously.

SIEM (Security Information and Event Management)

Cybersecurity

A system that collects and analyzes security data from across your entire IT environment in real time, looking for patterns that indicate a threat. It's like a security camera system for your network, except it watches everything all at once and never takes a break.

SLA (Service Level Agreement)

IT Management

A contract between an MSP and a client that defines the expected level of service — response times, uptime guarantees, resolution targets. A good SLA holds your IT provider accountable. A great one means they're already exceeding it before you have to check.

SOC (Security Operations Center)

Cybersecurity

A centralized team of cybersecurity analysts who monitor, detect, and respond to security threats 24/7/365. Flyght's SOC operations ensure that when something suspicious happens on your network at 3 AM, someone is already on it.

Social Engineering

Cybersecurity

Manipulating people into giving up confidential information or access through psychological tricks rather than technical hacking. It's the con artist approach to cybercrime — and it works because humans are trusting by nature. Training your team to recognize these tactics is critical.

SSO (Single Sign-On)

Cybersecurity

An authentication method that lets users log in once and access multiple applications without re-entering credentials. Fewer passwords to remember means fewer sticky notes on monitors. Everyone wins.

T

The Flyght EffectFlyght Original

Flyght Exclusive

What happens when you finally switch to an IT provider that gives a damn. Common symptoms include an inbox free of IT emergencies, employees who stop complaining about technology, and the CEO wondering what the IT budget was even for before. Caution: may cause extreme satisfaction and unsolicited referrals.

U

UCaaS (Unified Communications as a Service)

Cloud & Infrastructure

A cloud-based platform that combines voice, video, messaging, and collaboration tools into one solution. Think Microsoft Teams or Zoom — but integrated with your phone system, your CRM, and your sanity.

UPS (Uninterruptible Power Supply)

IT Management

A battery backup device that provides emergency power when the main power source fails, giving you time to safely shut down equipment or ride out a brief outage. Every server and critical workstation should have one. Toledo weather doesn't ask for permission before knocking out power.

V

vCIO (Virtual Chief Information Officer)

IT Management

A strategic technology advisor provided by your MSP who helps align your IT with your business goals. At Flyght, your vCIO develops technology roadmaps, manages IT budgets, evaluates vendors, and attends QBRs — giving you C-level IT leadership without the C-level salary.

VLAN (Virtual Local Area Network)

Networking

A method of segmenting a physical network into separate logical networks for security and performance. For example, your guest Wi-Fi should be on a different VLAN than your accounting department. If they're not, that's a problem we can fix.

VoIP (Voice over Internet Protocol)

Cloud & Infrastructure

Phone service delivered over the internet instead of traditional phone lines. VoIP systems are more flexible, more affordable, and way easier to manage than legacy phone systems. Plus, you can take calls from anywhere — your desk, your phone, or the coffee shop down the street.

VPN (Virtual Private Network)

Networking

An encrypted connection that allows remote users to securely access a company's network as if they were physically in the office. Essential for remote and hybrid workforces. Not the same thing as the VPN app people use to watch Netflix from other countries.

Vulnerability Assessment

Cybersecurity

A systematic review of security weaknesses in your IT environment. Unlike a penetration test, a vulnerability assessment identifies and prioritizes weaknesses without actively exploiting them. Think of it as a health checkup for your network.

W

WAP (Wireless Access Point)

Networking

A networking device that allows Wi-Fi devices to connect to a wired network. Enterprise-grade WAPs from Ubiquiti or Cisco Meraki provide better coverage, faster speeds, and more security than the consumer router you bought at Best Buy.

Z

Zero Trust

Cybersecurity

A security framework that assumes no user, device, or system should be automatically trusted — even if they're inside the network. Every access request is verified, every time. It's the 'trust nobody' approach to cybersecurity, and in 2025, it's the smart one.

57 terms • Last updated March 2026

Still confused? No judgment.

Technology moves fast and acronyms multiply like rabbits. If you'd rather just talk to a human who can explain it all, that's literally what we're here for.