Learn to talk tech with our IT Jargon Buster

Mar 01, 2023

A few words of a foreign language can get you a long way in a strange land.

We know that IT jargon is an alien language to a lot of people, and we do our best to keep the tech talk to a minimum when we’re working with our clients. 


In any case, you probably have enough of your own office jargon to start worrying about ours.

But in a tech-led world, a lot of IT terms are cropping up more and more in everyday conversation. And if you do have a problem you need help with – or just a question you’d like to ask us about your business IT – it’ll save a lot of time if you have a few words of lingo in your locker.


Our new guide is a great place to start. It won’t tell you everything, but if you need an easy A-Z of some of the most common terms you’ll hear when you’re talking with an IT expert, then you’ve come to the right place.


Let’s start at the beginning…



A


Adware

Software that automatically downloads adverts when you’re online, such as banner ads and pop-ups


AI (Artificial Intelligence)

Systems and devices that simulate human behaviors and decisions. This can include creating systems, language processing, speech recognition and machine vision


Antivirus 

Software that identifies and removes viruses from your device. Also known as anti-malware


API (Application Programming Interface)

Software that allows two or more applications or programs to communicate with each other and share information




B



Backdoor

A vulnerability in a security system that allows unwanted access to files and data


Bandwidth

The maximum amount of data you can send and receive in a given amount of time, over an internet connection. Imagine a big pipe compared with a small pipe


Botnet

A network of private computers infected with malware and controlled as a group to spread the virus further



C


Cache

A temporary file that stores information on your device to speed things up. For instance a web cache might remember the last thing you were doing so it can reload a page where you left off


(The) Cloud

Data storage and computing power that lives on remote servers, which are accessed via the internet


Corrupted

An unusable data file


Cyber security

Any and all security measures put in place to protect your devices, systems and network from cyber attack



D


Dark web

A hidden part of the internet, accessed using special software. It’s rife with criminal activity. This is where stolen data, such as credit card details, is often sold


Data breach

A security incident where private data is viewed or stolen by unauthorized persons


DDoS (Distributed Denial of Service)

A type of cyber attack that harms or stops a network by flooding it with data from numerous other devices


Downtime

The period of time a network or systems are offline (or ‘down’), preventing the normal running of a business


E


Encryption

The process of encoding data to make it unreadable without the right access information – usually a password, passkey or authentication app



F


Firewall

A security measure that controls what data can come in and out of your network 


FTP (File Transfer Protocol)

Protocol (see below) used for transferring files from a server to a computer across a network. This is usually authenticated with usernames and passwords



G


GIF (Graphic Interchange Format) 

A type of image file than can be either animated or static 


Gigabyte (GB)

Unit of data equal to one thousand million bytes. A typical movie download might be between 1 and 4 GB




H


Hardware

The physical devices in your IT world – computers, printers, phones, tablets


Hotspot (Wi-Fi)

A physical location where you can gain internet access via Wi-Fi


HTML (Hypertext Markup Language)

The universal language of the internet, used to structure web pages, tell your web browser how to display them and create links between them



I


Infrastructure

Your entire system – your network, servers, and all your devices


iOS

Operating software manufactured by Apple and used exclusively on its hardware


IP address

A unique number that identifies a device connected to the internet



J


Java

A widely used programming language used in millions of applications and devices around the world


Javascript

Unrelated to Java, Javascript is used everywhere on the internet. It’s a programming language used within all web browsers to perform a whole range of functions



K


Keylogger

Software used by cybercriminals to record the keys pressed on a keyboard. This information can be used to access login credentials and other sensitive information



L


LAN (Local Area Network)

A network of connected devices that spans a small area, such as your office or home



M


Malware

Malicious software, a type of virus, designed to infect your system and disrupt, damage, or gain access to your device, server or network. This can lead to the unauthorized access or theft of data and private information


Megabyte

Unit of data equal to one million forty-eight thousand, five hundred and seventy bytes



N


NOS (Network Operating System)

A specialized operating system for a network device, like a router or firewall


NTFS (Network Transfer File System)

A file system used by Windows for storing and retrieving files on a hard disk



O


OS (Operating System)

Software that manages a computer’s basic functions, and provides common services for computer programs



P


Phishing

Scam emails that pretend to be from a credible source and aim to steal personal information and/or login credentials


Protocol

The set of rules that allows different devices to communicate with each other  


Proxy server

A server that sits between a device requesting information, and the server providing that information. For example, it could be a gateway between your laptop and the internet, that stops hackers from reaching your network



R


RAM (Random Access Memory)

A form of temporary computer memory that’s usually used to store working data


Ransomware

Malware that encrypts sensitive data and demands a ransom for its release (ransoms should never be paid – data is often never properly released, or is only partially returned)


Router

A device that directs data to the right places in a network



S


Server

A computer or program that manages access to a network and holds data in one location for multiple users to access


Software

Programs and apps that make devices work


Spyware

Malware (see above) that spies on the actions you take on your device. This can be used to steal data or passwords, or listen in to conversations



T


Troubleshoot

To analyze a problem with a view to solving it (something we do a lot of!) 


Trojan

A form of malware that looks harmless but conceals a virus 



U


UAC (User Account Control)

A feature that only allows authorized users to make changes to a system or device


USB

A type of widely used cable that connects or charges devices. This could be a keyboard connecting to a computer, or a flash drive transferring data



V


Virus

A malicious computer program or code that can copy itself and spread throughout a network, corrupting or damaging data and systems


VPN (Virtual Private Network)

A more secure way of connecting to a company’s network remotely, or using the internet over a public Wi-Fi connection



W


WAN (Wide Area Network)

A network of devices that are connected across a wider area than a LAN, and allows you to connect to smaller networks


WLAN (Wireless Local Area Network)

A wireless network that connects two or more devices, creating a LAN


Worm

A type of malware that replicates itself to spread to other devices across a network without human activation



Z


Zip file

A file that compresses its contents to create a smaller file that’s easier to share or store




We hope this has helped.


Yes, we operate in a technical world with some jargon that can be
off-putting if it’s not something you’re used to talking about. 


But your business IT is there to make your life easier and more efficient. We take a lot of pride in our ability to work with our clients, helping them to understand their systems without sending their heads into a spin. 


So if your current IT support provider can’t do that – or you don’t have support you can call on for help and advice whenever you need them – we’d love to have a chat to find out how we can help you.


Get in touch anytime to arrange a no obligation conversation. You’re guaranteed it will be jargon-free.

08 May, 2024
We all know how important it is to keep our people up-to-date on the latest cyber threats. After all, with cyber attacks on the rise, staying one step ahead is crucial to protect your business from potential breaches. But here’s the thing – annual cyber security training just isn’t cutting it anymore. Sure, it’s become a routine part of the calendar for many organizations. And it’s great that it’s happening at all. But ask any security leader, and they’ll tell you… employees find it time-consuming and uninspiring. From clicking through slides to skimming through videos at double-speed, it’s usually seen as just another box to check. And let’s be honest, even for those who do engage with the training, there’s little evidence it leads to real behavior change. That’s because the traditional approach lacks interactivity and doesn’t connect with employees on a personal level. It’s more about checking boxes than building a culture of cyber security vigilance. Guess what? There’s a better way. It’s all about small, regular, human-centric interventions. Think of it like the speed signs you see when you’re driving. They remind people to stop and think before they engage in risky behavior. Just as the signs work for driving, this kind of training makes your employees more aware of what they’re clicking. By nudging employees toward safer decisions in real-time, we can help them develop better cyber hygiene habits without overwhelming them with information overload. It’s about empowering them to make smarter choices every day. And with the amount of Generative AI and third-party tools we’re surrounded with right now, it’s more important than ever to give employees the guidance they need to navigate potential risks. Whether it’s through real-time coaching or policy reminders, we can help employees understand the importance of safeguarding sensitive data. So, while there may be a place for annual training, it’s time to think about using a more proactive approach to cyber security education. This is something we can help you with. If you want to learn more, get in touch.
08 Apr, 2024
Imagine you're driving down a winding road in the middle of nowhere. Suddenly, your car breaks down. You're stuck, miles from assistance. You feel helpless. Frantically searching for a solution. This scenario isn't too different from the world of IT support when you rely on what’s known as a break/fix relationship with your provider (when your IT is broken, they fix it. And that’s it; there’s no proactive work). But what if there was a way to ensure a smoother journey? That's where the magic of having a contract with your IT support provider comes in. Think of it as having a trusted mechanic who not only fixes your car but actually prevents breakdowns in the first place. Whether you run a bustling corporation or a small startup, entering into a contract with your IT support provider is the smart, cost-effective way to ensure a smoother tech journey.
20 Mar, 2024
Microsoft’s made another update to Windows 11, and while it’s a small one, it could make a big impact. We have all the details of what’s changing.
28 Apr, 2023
How to start planning a big IT project.
01 Apr, 2023
If you haven’t upgraded your security, you could be making life far too easy for an intruder.
01 Feb, 2023
It goes like this.
Share by: