LogicalNet Cybersecurity & IT Glossary
Clear, plain-English definitions of the terms we use across our cybersecurity and managed IT services. Every term includes types, common mistakes, and an FAQ.
Every term, one place
Written for business leaders, not security experts.
BCDR
BCDR is the combined discipline of Business Continuity (BC) and Disaster Recovery (DR). BC ensures the business keeps operating during…
BEC
Business Email Compromise (BEC) is a targeted email fraud technique where attackers impersonate executives, vendors, or trusted partners…
Co-Managed IT
Co-Managed IT is a hybrid engagement model where an external MSP supplements an internal IT team rather than replacing it. The internal…
Conditional Access
Conditional Access is a policy-driven access control approach that evaluates signals such as user identity, device health, location, and…
Cyber Insurance
Cyber insurance is a policy that covers financial losses from cybersecurity incidents — ransomware payments, data breach response,…
DLP
Data Loss Prevention (DLP) is a category of security technology that identifies, monitors, and protects sensitive data as it moves…
EDR
Endpoint Detection and Response (EDR) is security technology that continuously monitors endpoints — laptops, desktops, and servers — for…
Fractional CIO
A Fractional CIO (also called a virtual CIO or vCIO) is a senior technology advisor engaged on a part-time basis to build IT strategy,…
HIPAA
The Health Insurance Portability and Accountability Act (HIPAA) is a federal law that establishes national standards for protecting…
IAM
Identity and Access Management (IAM) is the framework of policies, processes, and technologies that ensure the right people have the…
Immutable Backup
An immutable backup is a backup copy that cannot be modified or deleted for a defined retention period, even by an administrator or an…
Incident Response
Incident Response (IR) is the structured process for detecting, containing, eradicating, and recovering from cybersecurity incidents. A…
Least Privilege
Least privilege is the security principle of giving every user, account, and system only the minimum access required to do its job.…
M365 Tenant Hardening
M365 tenant hardening is the process of systematically configuring Microsoft 365 settings — MFA, conditional access, safe links, audit…
MDR
Managed Detection and Response (MDR) is a service where external security analysts use EDR or XDR tools to monitor your environment…
MSP
A Managed Service Provider (MSP) is a company that remotely manages a client’s IT infrastructure, end-user systems, and technology…
MSSP
A Managed Security Service Provider (MSSP) is a specialized managed service provider focused on cybersecurity — monitoring, detecting,…
NIST CSF
The NIST Cybersecurity Framework (NIST CSF) is a voluntary, risk-based framework developed by the National Institute of Standards and…
NOC
A Network Operations Center (NOC) is the team — internal or outsourced — responsible for monitoring and managing IT infrastructure…
PAM
Privileged Access Management (PAM) is a specialized identity discipline focused on accounts with elevated permissions — IT admins,…
Patch Management
Patch management is the disciplined process of identifying, acquiring, testing, and deploying software updates that fix security…
PCI DSS
The Payment Card Industry Data Security Standard (PCI DSS) is the required security standard for any business that stores, processes, or…
Phishing
Phishing is a social engineering attack that uses fraudulent messages — usually email, sometimes text or voice — to trick users into…
Phishing-Resistant MFA
Phishing-resistant MFA is a category of multi-factor authentication where the second factor cannot be intercepted, replayed, or tricked…
Ransomware
Ransomware is a category of malware that encrypts files and demands payment in exchange for decryption. Modern ransomware operations…
RTO vs RPO
RTO (Recovery Time Objective) is the maximum acceptable downtime for a system or business process before the impact becomes…
SOC
A Security Operations Center (SOC) is the team — internal or outsourced — responsible for monitoring, detecting, investigating, and…
SOC 2
SOC 2 is an auditing framework developed by the AICPA that evaluates a service organization’s controls against five Trust Services…
SOC as a Service
SOC as a Service (SOCaaS) is an outsourced model where a specialized provider delivers 24/7 security monitoring, detection, and response…
Spear Phishing
Spear phishing is a highly targeted form of phishing aimed at specific individuals or small groups. Attackers research their targets,…
SSO
Single Sign-On (SSO) is an authentication method that lets users access multiple applications with a single set of credentials. Instead…
XDR
Extended Detection and Response (XDR) is a security approach that correlates signals across multiple layers — endpoints, email,…
Zero Trust
Zero Trust is a security model that assumes no user, device, or network request is trustworthy by default. Every access attempt is…
Have a question that isn’t in the glossary?
LogicalNet engineers are happy to explain how any of this applies to your business. Schedule a no-pressure consult.