IT terminology can be confusing. This glossary defines 30 essential IT terms that every business owner, manager, or decision-maker should understand — explained in plain language with links to deeper resources where relevant.
The policies and tools that control who can access your systems, applications, and data. Includes user authentication, role-based permissions, and multi-factor authentication. Proper access management prevents unauthorised access and is a requirement under frameworks like the Essential Eight.
Microsoft’s cloud computing platform. Businesses use Azure to host servers, run applications, store data, and build infrastructure without maintaining physical hardware. Epic IT provides Azure cloud services including migration, management, and optimisation.
The process of copying your data to a separate location so it can be restored if the original is lost, corrupted, or encrypted by ransomware. Disaster recovery goes further — it is the plan and infrastructure for getting your entire business back online after a major incident. Regular, tested backups are one of the Essential Eight mitigation strategies.
A policy that allows employees to use their personal laptops, phones, or tablets for work. BYOD requires careful security management through tools like Microsoft Intune to separate personal and business data and enforce security policies.
The process of moving your IT infrastructure, applications, or data from on-premise servers to cloud platforms like Microsoft Azure or Microsoft 365. A well-planned migration eliminates hardware dependencies, reduces costs, and improves scalability. See our cloud migration guide.
A hybrid model where an external MSP works alongside your internal IT team. The MSP typically handles 24/7 monitoring, cybersecurity, and helpdesk overflow, while the internal team focuses on business-specific applications and strategic projects.
The practice of protecting your systems, networks, and data from digital attacks. Includes endpoint protection, email security, access controls, vulnerability management, security awareness training, and compliance with frameworks like the Essential Eight and SMB1001. Epic IT delivers managed cybersecurity as part of our IT agreements.
A security tool that continuously monitors your devices (endpoints) for suspicious activity. Unlike traditional antivirus which blocks known threats, EDR detects unusual behaviour, investigates it, and can automatically isolate a compromised device. Learn more about EDR.
Any device that connects to your network — laptops, desktops, mobile phones, tablets, servers. Endpoints are the most common entry point for cyberattacks, which is why endpoint management and endpoint security are critical components of managed IT services.
A cybersecurity framework developed by the Australian Cyber Security Centre (ACSC). It defines eight practical mitigation strategies that address the most common methods attackers use to compromise systems. The eight controls are: patch applications, patch operating systems, multi-factor authentication, restrict admin privileges, application control, restrict Office macros, user application hardening, and regular backups. See our Essential Eight service page.
The first point of contact when you have an IT issue. In a managed IT services model, the helpdesk is staffed by engineers who can resolve most issues remotely. At Epic IT, helpdesk calls are answered in 36 seconds by Perth-based engineers.
A cloud computing model where you rent infrastructure — servers, storage, networking — from a provider like Microsoft Azure instead of buying and maintaining physical hardware. You manage the software; the provider manages the hardware.
Microsoft’s cloud-based endpoint management tool. IT administrators use Intune to manage device configuration, enforce security policies, deploy software, and track compliance across all devices in the organisation — regardless of location.
An international standard for information security management systems (ISMS). Certification means an organisation has been independently audited and proven to have a systematic approach to managing sensitive information. Epic IT is ISO 27001 certified.
A model where a business outsources the management of its IT environment to a third-party provider (MSP) under a fixed monthly agreement. Includes helpdesk support, proactive monitoring, patch management, cybersecurity, endpoint management, and strategic advisory. See our complete guide: What are managed IT services?
A managed security service where a dedicated team monitors your environment 24/7, hunts for threats, and responds to incidents on your behalf. MDR goes beyond EDR by adding human expertise and active threat hunting to automated detection.
A security method that requires two or more forms of verification before granting access — typically something you know (password) plus something you have (phone) or something you are (biometric). MFA is one of the Essential Eight controls and blocks the majority of credential-based attacks.
Microsoft’s cloud-based productivity suite including Outlook, Teams, SharePoint, OneDrive, Word, Excel, PowerPoint, and security tools. Business plans include email hosting, file storage, collaboration tools, and — at higher tiers — advanced security features. Epic IT provides Microsoft 365 management.
A company that manages a business’s IT environment under a fixed monthly agreement. An MSP provides helpdesk support, monitoring, cybersecurity, endpoint management, and strategic advisory. Learn more about MSPs.
The process of applying security updates to operating systems and applications. Unpatched software is one of the most common ways attackers gain access to systems. Patching within 48 hours of a vulnerability being disclosed is a key Essential Eight requirement.
A controlled simulation of a cyberattack against your systems to identify vulnerabilities before real attackers do. Includes network testing, application testing, and social engineering. Results come with actionable remediation recommendations. See our penetration testing service.
A type of malware that encrypts your files and demands payment for the decryption key. Ransomware is the most financially damaging cyber threat facing Australian businesses. Defence requires layered security: patching, endpoint protection, email filtering, backups, and user training.
Software delivered over the internet on a subscription basis instead of installed locally. Microsoft 365, Xero, and Salesforce are SaaS products. You access them through a browser; the provider handles hosting, updates, and infrastructure.
A documented commitment between a service provider and client defining measurable performance standards — response times, resolution times, uptime guarantees. Your MSP’s SLA should include specific, measurable targets, not vague promises.
An internationally recognised cybersecurity certification standard built for small and medium-sized businesses. Developed by Dynamic Standards International, it provides a five-tier pathway (Bronze to Diamond) for progressively strengthening cybersecurity. See our SMB1001 certification page.
A centralised team that monitors an organisation’s IT environment for security threats around the clock. Some MSPs operate their own SOC; others partner with dedicated SOC providers. The goal is continuous threat detection and rapid incident response.
An outsourced IT leadership service. Your vCIO develops technology strategy, manages IT budgets, evaluates vendors, and presents quarterly business reviews — providing the strategic guidance of a CIO without the full-time salary. See our vCIO services.
A phone system that uses the internet instead of traditional phone lines. VoIP systems like Microsoft Teams Phone offer call routing, voicemail, conferencing, and integration with your collaboration tools at a lower cost than legacy PBX systems.
An encrypted connection between a remote device and your company network. VPNs allow employees to securely access internal systems from outside the office. Increasingly being replaced by zero-trust approaches using tools like Microsoft Entra ID and conditional access policies.
A security model based on the principle of “never trust, always verify.” Every user and device must be authenticated and authorised before accessing any resource, regardless of whether they are inside or outside the network. Microsoft’s Entra ID and Conditional Access are key tools for implementing zero trust.