The Ultimate IT Glossary

At MAXtech, we believe you shouldn’t need a technical degree just to understand your company’s monthly IT bill. Whether you are a law firm, a contractor, or a medical practice, your technology should be an asset—not a mystery.

We created the MAXtech University Glossary to pull back the curtain on Managed IT. This isn’t just a list of definitions; it’s a toolkit designed to help you stay current with modern terminology so you can make informed decisions about your cybersecurity, cloud infrastructure, and business continuity.

Why Staying Current Matters

Technology moves fast. As threats evolve and systems change, understanding these terms ensures you know exactly what services you are receiving and how they protect your bottom line. Knowing the difference between a “standard backup” and a “Disaster Recovery” plan can be the difference between a productive Monday and a catastrophic data breach.

Browse our comprehensive guide below to get up to speed on the terms that impact your bottom line.

Cybersecurity & Threat Protection

  • Advanced Endpoint Protection (AEP): Think of this as AI Antivirus. Unlike old software that only reacts to known threats, AEP uses artificial intelligence to stop suspicious behavior before it can execute.
  • Brute Force Attack: A digital break-in where hackers try thousands of password combinations per second. we prevent this with MFA and account lockout policies that freeze the door after a few wrong guesses.
  • Dark Web Monitoring: We scan the internet’s black markets to see if your company’s emails or passwords have been leaked in a data breach, allowing us to change them before a hacker logs in.
  • Deepfake Fraud Protection: Hackers now use AI to mimic executive voices or faces to authorize fraudulent wire transfers. We implement verification protocols to help your team spot these digital imposters.
  • Immutable Backups: Your Ransomware Armor. This is a backup that cannot be changed or deleted by anyone—even a hacker with your admin password—ensuring a clean rewind to safety.
  • MDR (Managed Detection & Response): While AEP is your shield, MDR is your 24/7 security guard. It involves a team of experts watching your network around the clock to stop attacks in real-time.
  • Multi-Factor Authentication (MFA/2FA): A security layer that requires two forms of ID (like a password plus a code sent to your phone). This is the single most effective way to prevent unauthorized access.
  • Phishing, Spear Phishing & Whaling: Fraudulent emails designed to steal data. Spear phishing is a targeted attack on a specific employee, while Whaling aims for the Big Fish—owners and executives.
  • Ransomware: Malware that locks and encrypts your files until a ransom is paid. Our goal is to ensure you never have to pay a dime to get your data back.
  • Security Awareness Training: Since 43% of cyberattacks target small businesses, your team is your first line of defense. This coaching teaches them to spot modern, AI-generated phishing that no longer has obvious typos.
  • Zero-Day Threat: A software flaw that is unknown to the developer. Hackers exploit these holes before a fix is created, making them one of the most difficult threats to detect without advanced, AI-driven security tools.
  • Zero-Trust Architecture: A security model based on never trust, always verify. It ensures every device is authenticated, even if it is already plugged into your office wall.

Network & Infrastructure

  • Bandwidth: The maximum amount of data your internet can handle at once. Think of it as the “width of the pipe”—the wider the pipe, the more work your team can get done simultaneously.
  • Cloud Computing: Storing and accessing data over the internet (like Microsoft 365 or Azure) instead of a loud, hot server box in your office closet.
  • Firewall: A security device that monitors your office traffic and decides what to allow in and what to block based on your specific safety rules.
  • Managed Wi-Fi: We design and manage your wireless network to eliminate “dead zones” while ensuring guest traffic is kept entirely separate from your private business data.
  • SD-WAN: A smart way to manage your internet that prioritizes your most important tasks (like a VoIP call) over less critical data to ensure zero lag.
  • VPN (Virtual Private Network): An encrypted “tunnel” that lets remote employees connect to the office network safely from home or a coffee shop.
graphic of globe with internet and network iconography over a cityscape

Strategy & Business Continuity

  • BDR (Backup & Disaster Recovery): Your business “Life Insurance”. This technology ensures your data is backed up offsite and can be restored in minutes if your local server fails.
  • “Break-Fix” Model: The outdated way of doing IT where the provider only makes money when you are down. In 2026, one hour of downtime can cost an SMB $12,000–$24,000—making this model a massive risk.
  • Business Continuity: The actual plan that keeps your essential functions running during and immediately after a disaster.
  • Compliance (HIPAA, PCI, CMMC): Industry-specific legal rules for protecting sensitive data. We act as the “legal handshake” to ensure your IT meets these requirements
  • Cyber Insurance: A specialized insurance policy that helps cover the costs of a data breach. Many providers now require you to have things like MFA and BDR in place before they will cover you.
  • OpEx vs. CapEx: Instead of a massive upfront bill for hardware (CapEx), managed IT turns tech into a predictable, monthly subscription (OpEx), keeping your cash flow steady.
  • RPO (Recovery Point Objective): The “Data Loss” metric. It answers the question: “How many hours of work can we afford to lose?”.
  • RTO (Recovery Time Objective): The “Downtime” metric. It answers: “How long can we afford to be offline before the business starts losing significant money?”.
  • SLA (Service Level Agreement): Our “Promise of Performance.” A contract that guarantees our response times—ensuring your team isn’t left idle when a problem arises.
  • vCIO (Virtual Chief Information Officer): A dedicated advisor who helps you align tech with business goals, creates IT budgets, and plans your 3-to-5-year hardware roadmap.

Hardware & Maintenance

  • EOL (End of Life): When a manufacturer stops supporting a product. Crucial: Windows 10 hits EOL in October 2025, meaning it will no longer receive security patches.
  • Hardware as a Service (HaaS): A model where you pay a monthly fee for your laptops, servers, and firewalls instead of a massive upfront capital expense.
  • Patch Management: The process of regularly updating your software to “patch” the security holes that hackers love to exploit.
  • Remote Monitoring & Management (RMM): The eyes and ears of MAXtech. It lets us see the health of every PC in your office in real-time, often fixing a problem before your staff even notices it.
  • UPS (Uninterruptible Power Supply): A high-end battery backup that keeps your critical servers or network gear running just long enough to shut down safely during a power outage, preventing hardware damage.
  • VoIP (Voice over IP): A phone system that runs over your internet. It allows features like using your office extension on your mobile phone, so you never miss a client call.

Ready to Turn Your Technology into a Competitive Advantage?

In 2026, “good enough” IT is a liability. If your current provider only shows up when something breaks, they aren’t helping you grow—they’re just managing your decline.

You deserve a partner who translates complex technical risks into clear business opportunities. At MAXtech, we don’t just manage your help desk; we provide the strategic foresight needed to protect your data, streamline your operations, and ensure your team stays productive—wherever they work.

Stop guessing about your security and start scaling your business.