Qlic
Welcome to our IT Glossary. Here is a glossary of common IT terms from Qlic.
Analytics is the process of collecting, analysing and interpreting data to gain insights.
Anti-Virus & Malware Protection blocks malware and infections by identifying and preventing the handful of techniques and behaviours used in almost every exploit.
AI is the ability of machines performing tasks that typically require human intelligence, such as learning, problem-solving, decision-making.
AR is a technology that overlays digital information onto the physical world, enhancing the user’s perception and interaction with their environment.
Autotask is a leading IT Business Management software provider. It combines RMM, service desk, CRM, projects, time and billing and reporting into one unified platform. We’re happy to announce our recent partnership with Autotask, a leading IT business management software specifically for Managed Service Providers.
The online Dashboard through Qlic showing you statistics such as; common ticket trends, response times, survey responses, average ticket completion time.
Big data refers to large volumes of structured and unstructured data that are too complex to process using traditional data processing methods.
Blockchain is a decentralised and distributed digital ledger that records transactions across multiple computers to create secure and transparent records.
Cloud computing services involves the delivery of computing services including servers, storage, databases, networking, software, analytics and more.
Cyber Essentials is a Government backed scheme that will help you to protect your organisation against a whole range of the most common cyber attacks.
Cyber security refers to the protection of computer systems, networks and sensitive data from unauthorised access, theft, or malicious attacks.
Data backup and recovery is the process of creating copies of critical data as well as storing them in secure locations to prevent data loss that can be due to system failures, human error, natural disasters, or cyber attacks.
Each year, millions of laptop computers are misplaced, stolen, or lost; many of them containing important and sensitive data. Full device encryption is the essential first line of defence to protect your data in any of these events.
DevOps is a set of practices that combines software development and operations to improve collaboration, automation and efficiency in the software development lifecycle.
Disaster recovery involves the planning and preparation of processes and procedures to recover all IT systems, applications and data in the event of human error, cyber breach or other disruptive events.
Edge computing is a distributed computing that enables data processing and analysis at the edge of the network, closer to the source of data, to reduce latency, increase efficiency and improve security.
Elementor brings a new set of tools to your WordPress website. It’s a drag-and-drop website builder will make the whole process of creating and managing a website both much easier and faster.
With email filtering, you can protect your cloud mailboxes against new, sophisticated attacks in real time. By protecting against unsafe attachments and expanding protection against malicious links, it provides advanced security features to provide better zero-day protection.
Endpoint security refers to the protection of end-user devices, such as desktops, laptops, smartphones and tablets from various security threats, including malware, viruses, and phishing attacks.
Exclaimer Cloud Signatures for Microsoft 365 is a multi-award-winning signature management service. It’s recommended to use Exclaimer Cloud Signatures for organisations to centrally manage professional Microsoft 365 signatures for all users sending email from any device.
Firewalls provide the ultimate network security with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks.
GDPR is a legal framework with guidelines for the collection and processing of personal information in the EU. It affects all organisations that hold personal data on EU citizens, regardless of where the organisation is based in the world.
Help desk support is the provision of technical assistance and troubleshooting to end-users who encounter technical problems with hardware, software or other IT services.
In-house IT support is having your own IT department or IT specialist inside your organisation.
IoT refers to the network of physical objects or “things” embedded with sensors, software and connectivity to collect and exchange data with other devices or systems over the internet.
IT consulting is expert advice and guidance on various IT-related matters, such as technology planning, budgeting, procurement, implementation and optimisation.
ML is a subset of AI that involves training machines to learn from data and improve their performance over time.
An attack where a perpetrator positions himself in a conversation between a user and an application – either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
Managed Detection & Response provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully-managed service
Managed hosting is a web hosting service in which the hosting provider manages and maintains the server infrastructure, including hardware, operating system, security and backups.
Managed print services involve outsourcing the management and maintenance of print infrastructure, including printers, copiers and scanners to a third-party provider.
Microsoft 365 provides you with access to your email and documents wherever you are, on any device. Microsoft 365 Hosted Exchange email provides industry-leading technology at a fraction of the cost, making Microsoft office 365 for charities the perfect option.
Microsoft 365 Exchange Online is a cloud based messaging platform that delivers email, calendar, contacts, and tasks.
Automates configuration of new laptops and workstations using the Microsoft Cloud.
Within Microsoft makes scheduling and managing appointments easier. Enabling you to create calendars which their own unique set up.
A technology that provides protection against malware and spyware.
A cloud computing platform and online portal that allows you to access and manage cloud services and resources provided by Microsoft.
A software program that uses spreadsheets to organise numbers and data with formulas and functions.
Microsoft Intune is a cloud-based management solution that provides for mobile device and operating system management. Intune provides automated app installation, automated app updates and settings deployment as well as many other device management features no matter where a user is working.
Note taking software developed by Microsoft. It automatically syncs your notes as you work.
Organises your emails, calendars, contacts, tasks and to do lists all in one place.
A Data visualisation platform for business intelligence purposes
A presentation based programme that uses graphics, videos and many more things to make a presentation more interactive and interesting.
A cloud based service used to create websites. It can be used to secure places to store, organise, share and access information from any device.
A cloud based service, primarily used to store, share, and collaborate on files. It can be used to secure places to store data, share information with your team, and can provide access from any device or location with an internet connection.
A collaborative hub for chat, meetings, and teamwork. Imagine a virtual town square where colleagues gather, share files, and strategize.
A word processing program that users can type documents with save and share them with others, even the possibility to collaborate on them together.
Multi-factor Authentication adds an extra layer of security, making the user authentication a two-step process which requires the user to prove their identity. In addition to passwords, users are expected to acknowledge a phone call/text message or mobile app notification to complete the verification process.
Network monitoring is essentially the process of regularly checking performance, availability and security of a computer network. It identifies and resolves issues before they cause downtime or service disruptions.
Network security involves implementing various measures to protect computer networks, devices and data from unauthorised access or other malicious attacks.
Onsite support involves dispatching IT technicians to the client’s location to diagnose and resolve technical issues that cannot be resolved remotely.
Outsourced IT Support is from a third-party managed service provider (MSP) outside of our company.
Patch management is the process of identifying, testing and applying software updates or patches to fix vulnerabilities and improve the performance of computer systems and applications.
A type of Social Engineering attack, often used to steal user data, including login credentials and credit card numbers. Often occurring when an attacker dupes a trustworthy email.
Also known as your computer’s short-term memory. It’s like a post-it note for your CPU.
Ransomware is the number one cyber attack affecting organisations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive disruption to your charity’s productivity. Ransomware Protection prevents the malicious spontaneous encryption of data by ransomware—even trusted files that have been hijacked.
RMM is a software that enables IT service providers to remotely monitor, manage and support client devices, networks, and applications from a single console.
Remote support involves accessing and troubleshooting computer systems, networks, and applications from a remote location.
Training to enhance the security consciousness of an organisation. Covering Topics such as Cybersecurity, Information security and best practices for safeguarding sensitive data. The goal is to ensure employees have the skills to protect themselves against cyber threats.
An SLA is a contract between a service provider and the customer that outlines the specific services, performance levels and responsibilities of both parties.
SharePoint Online for charities is a cloud-based solutions that allows users to easily access, share and manage files, folders and content, from any internet connected device. This empowers teamwork and seamlessly collaborate across the organisation.
A type of Social Engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information or sending money to cyber attackers.
The tactic of manipulating, influencing or deceiving a victim in order to gain control over a computer system to steal personal or financial information.
SSL is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browser remain private.
The UniFi Enterprise Wi-Fi System is a scalable enterprise access point solution designed to be easily deployed and managed.
UX refers to the overall experience of a user when interacting with a product or service, including ease of use, functionality and aesthetic appeal.
UI refers to the visual and interactive elements of a product or service, including screens, buttons, menus and other design elements.
VR is a computer-generated simulation of an immersive environment that can be experienced through a headset or other devices.
A Virtual Private Network, it is encrypted and shielded, allowing data to travel through an encrypted tunnel ensuring sensitive information, such as company data, is transmitted safely
A Desktop and app virtualization service that runs on Azure.
WooCommerce helps you build an E-commerce store using WordPress. It takes that basic WordPress operating system and turns it into a fully-functioning E-commerce store.
WordPress is a Content Management System (CMS) for your website. It holds a commanding share of the web and is an easy to use CMS, has an intuitive interface and has vast availability of templates and plugins allowing complex functions to be integrated with ease.
Yoast is an SEO plugin available for WordPress. Yoast itself has received over a million downloads and when used correctly is guaranteed to improve your on-page SEO.