888-MENDERS
Client Portal
Schedule A Discovery Call
Service Areas
Menlo Park
Oakland
San Francisco
San Jose
San Mateo
IT Services
Managed IT Services
Strategy
Cybersecurity
IT Solutions
Industries
Architecture, Engineering, & Construction
Legal
Financial & Investment
BioTech & Healthcare
Government
Non-Profit
Company
Why Us
The Team
Careers
Tech Insights & Resources
IT Glossary
Blog
Service Areas
Menlo Park
Oakland
San Francisco
San Jose
San Mateo
IT Services
Managed IT Services
Strategy
Cybersecurity
IT Solutions
Industries
Architecture, Engineering, & Construction
Legal
Financial & Investment
BioTech & Healthcare
Government
Non-Profit
Company
Why Us
The Team
Careers
Tech Insights & Resources
IT Glossary
Blog
Schedule A Discovery Call
Glossary
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
a
Access Control
Active Directory (AD)
Advanced Persistent Threat (APT)
Artificial Intelligence (AI) in Cybersecurity
b
Backup as a Service (BaaS)
Backups
BCDR – Business Continuity and Disaster Recovery
Botnet
Break/Fix Model
Bring Your Own Device (BYOD)
Brute Force Attack
Business Email Compromise (BEC)
c
Cloud Computing
Cloud Migration
Cloud Security
Compliance Audit and Reporting
Compliance Requirements
Conditional Access
Content Filtering
Credential Stuffing
Cyber Liability Insurance
Cybersecurity
Cybersecurity Framework (CSF)
d
Dark Web Scanning
Dark Web Security Exposures
Data Encryption
Data Hygiene
Data Loss Prevention (DLP)
Denial-of-Service (DoS) Attack
Disaster Recovery as a Service (DRaaS)
Distributed Denial of Service (DDoS) Attack
e
EDR/MDR – Endpoint/Managed Detection & Response
Email Protection
Employee Security Training
Encryption
Endpoint Security
f
Firewall
g
Governance, Risk, and Compliance (GRC)
GPU (Graphics Processing Unit)
i
Identity and Access Management (IAM)
Immutable Backup
Incident Response Plan (IRP)
Incident Response Team (IRT)
Insider Threat
Intrusion Detection System (IDS)
l
Log Retention (SIEM)
m
Malware
Man-in-the-Middle (MitM) Attack
Managed Service Provider (MSP)
Managed Services
Managed SOC (Security Operations Centers)
Mobile Device Management (MDM)
Multi-Factor Authentication (MFA)
p
Password Hygiene
Password Policy
Password Vault
Patch Management
Patch Tuesday
Phishing
Phishing Simulation
Privileged Access Management (PAM)
r
Ransomware
Remote Desktop Protocol (RDP) Security
Remote Monitoring and Management (RMM)
Risk Assessment
s
Secure Access Service Edge (SASE)
Security Awareness Training
Security Information and Event Management (SIEM)
Security Posture
Service-Level Agreement (SLA)
Shadow IT
Single Sign-On (SSO)
Software as a Service (SaaS) Monitoring
Spear Phishing
Supply Chain Security
t
Targeted Threat Protection (TTP)
The Cloud
Threat Intelligence
Ticketing System
Two-factor Authentication (2FA)
u
USB Security
User Awareness Training
v
Virtual Private Network (VPN)
Virus Protection
Vulnerability Scanning
w
Web Application Firewall (WAF)
Wireless Security
z
Zero Trust Architecture
Zero-Day Exploit
Zero-Day Vulnerability
We collect cookies to analyze our website traffic and performance; we never collect any personal data.
Accept