Involves creating plans and processes to ensure that your organization can continue operations in case of a natural disaster, cyber attack, or any other event that disrupts your business.
BCDR – Business Continuity and Disaster Recovery
Botnet
A network of infected computers controlled by a hacker to carry out cyber attacks such as DDoS attacks, spam, and credential theft.
Break/Fix Model
A pay-as-you-go approach to IT support, where businesses only seek help when something goes wrong, rather than having ongoing maintenance or proactive monitoring.
Cloud Computing
The on-demand delivery of IT resources—such as servers, storage, and applications—over the internet, allowing businesses to scale and access technology without managing physical infrastructure.
Cloud Security
Policies, controls, and technologies that protect cloud-based data, applications, and services from cyber threats.