The IT Agency

Technology is evolving faster than ever before. For business owners, that pace brings an ever-changing list of acronyms, technical language, software jargon and compliance terms that now sit alongside everyday decisions. Perhaps you’re nodding along when meeting with insurers or software vendors, while silently trying to remember what “XDR” and “SIEM” means.

As IT professionals with decades of experience working with small and medium businesses, we see this every day. Business owners are expected to make informed decisions about risk, security and technology, often without clear explanations or a shared language. That gap is exactly why we have created this plain-English IT terminology glossary cheat sheet to help demystify the terms you are most likely to encounter in 2026 and understand what they mean in practical business terms.

Identity, access and security terminology

You will usually encounter these terms when discussing user logins, access control, cyber security improvements or responding to insurer and client security questions. They commonly come up during Microsoft 365 reviews, security incidents or when access controls are tightened.

Multi-factor authentication (MFA)

An extra step when logging in, such as an app approval or code, designed to reduce the risk of stolen passwords being enough to access systems.

Single sign-on (SSO)

One login that allows staff to access multiple systems, reducing password fatigue and security risk.

Identity provider (IdP)

The system that manages logins and access across your software tools. In Microsoft environments, this is Entra ID.

Entra ID

Microsoft’s identity and access platform that controls who can sign in, from where and under what conditions.

Conditional access

Rules that allow or block logins based on factors such as location, device security or whether MFA is used.

Privileged access

High-level administrative access that can change systems or security settings and carries higher risk if misused.

Email fraud and impersonation terminology

These terms often appear after a suspicious email, payment scam or near-miss incident. They are also raised during email security upgrades, cyber insurance discussions and fraud prevention reviews.

Business email compromise (BEC)

A common fraud type where attackers impersonate staff or suppliers to redirect payments or extract sensitive information.

Domain spoofing

Fake emails designed to look like they came from your business domain.

SPF, DKIM and DMARC

Email authentication standards that help prove emails sent from your domain are legitimate and reduce impersonation and fraud.

Safe Links and Safe Attachments

Email security features that scan links and attachments before users open them.

Device protection and threat detection

You are likely to hear these terms when IT providers talk about protecting laptops, desktops and mobile devices. They often appear in cyber security proposals, insurance questionnaires and conversations about ransomware protection.

Endpoint

Any device that connects to business systems, such as laptops, desktops or mobile phones.

Security information and event management (SIEM)

A system that collects and analyses security activity from across your IT environment to identify suspicious behaviour.

Endpoint detection and response (EDR)

Advanced security software that monitors devices for suspicious behaviour and responds to threats.

Managed detection and response (MDR)

A service where security specialists monitor and respond to threats on your behalf.

Extended detection and response (XDR)

A security approach that brings together threat detection across email, devices, servers and cloud systems into a single view.

Microsoft Defender

Microsoft’s suite of security tools protecting email, devices and cloud services, depending on licence level.

Microsoft Secure Score

A numerical score reflecting how many recommended security controls are enabled. Higher scores generally indicate lower risk.

Backup, recovery and resilience terminology

These terms usually surface after an outage, data loss or ransomware incident, or when insurers ask how quickly your business could recover from a cyber event.

Backup

A copy of business data stored separately so it can be restored if something goes wrong.

Immutable backup

Backups that cannot be changed or deleted, even by administrators, helping protect against ransomware.

Air-gapped backup

Backups are isolated from the main system to reduce the risk of being compromised.

Recovery time objective (RTO)

How quickly systems need to be restored after an incident.

Recovery point objective (RPO)

How much data loss is acceptable when systems are restored.

Disaster recovery

The process of restoring systems after a major outage or cyber incident.

Compliance, assurance and cyber readiness terms

These terms commonly appear in insurance renewals, tender documentation, supplier security questionnaires and client due diligence processes, even when no specific cyber standard is named.

Security controls

The actual protections in place, such as system settings, tools and processes, not just written policies.

Control evidence

Proof that security controls are active and working, often requested by insurers or clients.

Cyber resilience

The ability to prevent, respond to and recover from cyber incidents.

SMB1001 certification

An Australian cyber security standard designed for small and medium businesses.

AI and automation terminology

These terms increasingly appear in software demos, vendor conversations and internal discussions about productivity, automation and AI adoption. They also come up when businesses start considering AI risk and governance.

AI agent

An AI tool that can take actions on your behalf, such as creating tickets, updating systems or sending messages.

Agentic AI

A term describing AI systems that can plan steps and act across multiple tasks, not just respond once.

Copilot

Microsoft’s AI assistant built into Microsoft 365 applications to help users complete tasks.

Human-in-the-loop

A safeguard where a person reviews or approves AI outputs or actions before they are finalised.

Shadow AI

AI tools used by staff without approval or oversight, often creating data and compliance risk.

AI acceptable use policy

Simple guidance defining how AI tools can and cannot be used in the business.

The IT Agency helps keep businesses connected, protected, productive and supported with managed IT solutions that deliver real business outcomes. Talk to the team about how we can secure your systems, simplify your IT and strengthen your business resilience today.

In summary

  • Technology is evolving quickly and bringing new IT and AI terminology into everyday business decisions
  • A practical glossary makes conversations with IT providers, insurers and vendors easier
  • Clarity supports better decision-making as businesses grow