Man in the Middle (MITM)

IT Glossary
General IT

An attack where a perpetrator positions himself in a conversation between a user and an application – either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

Cyber Security
Anti-Virus & Malware Protection

Anti-Virus & Malware Protection blocks malware and infections by identifying and preventing the handful of techniques and behaviours used in almost every exploit.

General IT
Artificial Intelligence (AI)

AI is the ability of machines performing tasks that typically require human intelligence, such as learning, problem-solving, decision-making.

General IT
Augmented Reality (AR)

AR is a technology that overlays digital information onto the physical world, enhancing the user’s perception and interaction with their environment.

Managed IT Support
Autotask

Autotask is a leading IT Business Management software provider. It combines RMM, service desk, CRM, projects, time and billing and reporting into one unified platform. We’re happy to announce our recent partnership with Autotask, a leading IT business management software specifically for Managed Service Providers.

Cloud Solutions
AutoTask Client Dashboard

The online Dashboard through Qlic showing you statistics such as; common ticket trends, response times, survey responses, average ticket completion time.

General IT
Big Data

Big data refers to large volumes of structured and unstructured data that are too complex to process using traditional data processing methods.

General IT
Blockchain

Blockchain is a decentralised and distributed digital ledger that records transactions across multiple computers to create secure and transparent records.

Managed Services
Cloud Computing Services

Cloud computing services involves the delivery of computing services including servers, storage, databases, networking, software, analytics and more.

Cyber Security
Cyber Essentials

Cyber Essentials is a Government backed scheme that will help you to protect your organisation against a whole range of the most common cyber attacks.

General IT
Cyber security

Cyber security refers to the protection of computer systems, networks and sensitive data from unauthorised access, theft, or malicious attacks.

Cyber SecurityManaged Services
Data Backup and Recovery

Data backup and recovery is the process of creating copies of critical data as well as storing them in secure locations to prevent data loss that can be due to system failures, human error, natural disasters, or cyber attacks.

Cyber Security
Device Encryption

Each year, millions of laptop computers are misplaced, stolen, or lost; many of them containing important and sensitive data. Full device encryption is the essential first line of defence to protect your data in any of these events.

General IT
DevOps

DevOps is a set of practices that combines software development and operations to improve collaboration, automation and efficiency in the software development lifecycle.

Managed Services
Disaster Recovery

Disaster recovery involves the planning and preparation of processes and procedures to recover all IT systems, applications and data in the event of human error, cyber breach or other disruptive events.

General IT
Edge Computing

Edge computing is a distributed computing that enables data processing and analysis at the edge of the network, closer to the source of data, to reduce latency, increase efficiency and improve security.

Website Design
Elementor

Elementor brings a new set of tools to your WordPress website. It’s a drag-and-drop website builder will make the whole process of creating and managing a website both much easier and faster.

Cyber Security
Email Filtering

With email filtering, you can protect your cloud mailboxes against new, sophisticated attacks in real time. By protecting against unsafe attachments and expanding protection against malicious links, it provides advanced security features to provide better zero-day protection.

Managed IT Support
Endpoint Security

Endpoint security refers to the protection of end-user devices, such as desktops, laptops, smartphones and tablets from various security threats, including malware, viruses, and phishing attacks.

Infrastructure
Exclaimer Email Signature

Exclaimer Cloud Signatures for Microsoft 365 is a multi-award-winning signature management service. It’s recommended to use Exclaimer Cloud Signatures for organisations to centrally manage professional Microsoft 365 signatures for all users sending email from any device.

Cyber Security
Firewall

Firewalls provide the ultimate network security with everything you need in a single modular appliance. It simplifies your IT security without the complexity of multiple-point solutions. The intuitive interface will help you quickly create policies to control security risks.

Cyber Security
GDPR

GDPR is a legal framework with guidelines for the collection and processing of personal information in the EU. It affects all organisations that hold personal data on EU citizens, regardless of where the organisation is based in the world.

Managed Services
Help Desk Support

Help desk support is the provision of technical assistance and troubleshooting to end-users who encounter technical problems with hardware, software or other IT services.

Managed IT Support
In-House IT Support

In-house IT support is having your own IT department or IT specialist inside your organisation.

General IT
Internet of Things (IoT)

IoT refers to the network of physical objects or “things” embedded with sensors, software and connectivity to collect and exchange data with other devices or systems over the internet.

Managed Services
IT Consulting

IT consulting is expert advice and guidance on various IT-related matters, such as technology planning, budgeting, procurement, implementation and optimisation.

General IT
Machine Learning (ML)

ML is a subset of AI that involves training machines to learn from data and improve their performance over time.

General IT
Man in the Middle (MITM)

An attack where a perpetrator positions himself in a conversation between a user and an application – either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

Cyber Security
Managed Detection & Response

Managed Detection & Response provides 24/7 threat hunting, detection, and response capabilities delivered by an expert team as a fully-managed service

Managed Services
Managed Hosting

Managed hosting is a web hosting service in which the hosting provider manages and maintains the server infrastructure, including hardware, operating system, security and backups.

Managed IT Support
Managed Print Services

Managed print services involve outsourcing the management and maintenance of print infrastructure, including printers, copiers and scanners to a third-party provider.

Cloud Solutions
Microsoft 365

Microsoft 365 provides you with access to your email and documents wherever you are, on any device. Microsoft 365 Hosted Exchange email provides industry-leading technology at a fraction of the cost, making Microsoft office 365 for charities the perfect option.

Cloud Solutions
Microsoft 365 Exchange Online

Microsoft 365 Exchange Online is a cloud based messaging platform that delivers email, calendar, contacts, and tasks.

General IT
Microsoft Autopilot

Automates configuration of new laptops and workstations using the Microsoft Cloud.

General IT
Microsoft Bookings

Within Microsoft makes scheduling and managing appointments easier. Enabling you to create calendars which their own unique set up.

General IT
Microsoft Defender

A technology that provides protection against malware and spyware.

General IT
Microsoft Entra ID

A cloud computing platform and online portal that allows you to access and manage cloud services and resources provided by Microsoft.

General IT
Microsoft Excel

A software program that uses spreadsheets to organise numbers and data with formulas and functions.

Cloud Solutions
Microsoft Intune

Microsoft Intune is a cloud-based management solution that provides for mobile device and operating system management. Intune provides automated app installation, automated app updates and settings deployment as well as many other device management features no matter where a user is working.

General IT
Microsoft OneNote

Note taking software developed by Microsoft. It automatically syncs your notes as you work.

General IT
Microsoft Outlook

Organises your emails, calendars, contacts, tasks and to do lists all in one place.

General IT
Microsoft PowerBI

A Data visualisation platform for business intelligence purposes

General IT
Microsoft PowerPoint

A presentation based programme that uses graphics, videos and many more things to make a presentation more interactive and interesting.

Cloud Solutions
Microsoft SharePoint

A cloud based service used to create websites. It can be used to secure places to store, organise, share and access information from any device.

Cloud Solutions
Microsoft SharePoint

A cloud based service, primarily used to store, share, and collaborate on files. It can be used to secure places to store data, share information with your team, and can provide access from any device or location with an internet connection.

General IT
Microsoft Teams

A collaborative hub for chat, meetings, and teamwork. Imagine a virtual town square where colleagues gather, share files, and strategize.

General IT
Microsoft Word

A word processing program that users can type documents with save and share them with others, even the possibility to collaborate on them together.

Cyber Security
Multi-Factor Authentication

Multi-factor Authentication adds an extra layer of security, making the user authentication a two-step process which requires the user to prove their identity. In addition to passwords, users are expected to acknowledge a phone call/text message or mobile app notification to complete the verification process.

Managed Services
Network Monitoring

Network monitoring is essentially the process of regularly checking performance, availability and security of a computer network. It identifies and resolves issues before they cause downtime or service disruptions.

Managed IT Support
Network Security

Network security involves implementing various measures to protect computer networks, devices and data from unauthorised access or other malicious attacks.

Managed IT Support
Onsite Support

Onsite support involves dispatching IT technicians to the client’s location to diagnose and resolve technical issues that cannot be resolved remotely.

Managed IT Support
Outsourced IT Support

Outsourced IT Support is from a third-party managed service provider (MSP) outside of our company.

Managed IT Support
Patch Management

Patch management is the process of identifying, testing and applying software updates or patches to fix vulnerabilities and improve the performance of computer systems and applications.

Cyber Security
Phishing

A type of Social Engineering attack, often used to steal user data, including login credentials and credit card numbers. Often occurring when an attacker dupes a trustworthy email.

General IT
RAM (Random Access Memory)

Also known as your computer’s short-term memory. It’s like a post-it note for your CPU.

Cyber Security
Ransomware Protection

Ransomware is the number one cyber attack affecting organisations today. It encrypts your files and holds them hostage until the ransom is paid, causing massive disruption to your charity’s productivity. Ransomware Protection prevents the malicious spontaneous encryption of data by ransomware—even trusted files that have been hijacked.

Managed Services
Remote Monitoring and Management (RMM)

RMM is a software that enables IT service providers to remotely monitor, manage and support client devices, networks, and applications from a single console.

Managed IT Support
Remote Support

Remote support involves accessing and troubleshooting computer systems, networks, and applications from a remote location.

Cyber Security
Security Awareness Training

Training to enhance the security consciousness of an organisation. Covering Topics such as Cybersecurity, Information security and best practices for safeguarding sensitive data. The goal is to ensure employees have the skills to protect themselves against cyber threats.

Managed IT Support
Service Level Agreement (SLA)

An SLA is a contract between a service provider and the customer that outlines the specific services, performance levels and responsibilities of both parties.

Cloud Solutions
SharePoint Online

SharePoint Online for charities is a cloud-based solutions that allows users to easily access, share and manage files, folders and content, from any internet connected device. This empowers teamwork and seamlessly collaborate across the organisation.

Cyber Security
Smishing

A type of Social Engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information or sending money to cyber attackers.

Cyber Security
Social Engineering

The tactic of manipulating, influencing or deceiving a victim in order to gain control over a computer system to steal personal or financial information.

General IT
SSL Certificate

SSL is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browser remain private.

Managed Services
Ubiquiti UniFi

The UniFi Enterprise Wi-Fi System is a scalable enterprise access point solution designed to be easily deployed and managed.

General IT
User Experience (UX)

UX refers to the overall experience of a user when interacting with a product or service, including ease of use, functionality and aesthetic appeal.

General IT
User Interface (UI)

UI refers to the visual and interactive elements of a product or service, including screens, buttons, menus and other design elements.

General IT
Virtual Reality (VR)

VR is a computer-generated simulation of an immersive environment that can be experienced through a headset or other devices.

Website Design
VPN

A Virtual Private Network, it is encrypted and shielded, allowing data to travel through an encrypted tunnel ensuring sensitive information, such as company data, is transmitted safely

Cloud Solutions
Windows Virtual Desktop

A Desktop and app virtualization service that runs on Azure.

Website Design
WooCommerce

WooCommerce helps you build an E-commerce store using WordPress. It takes that basic WordPress operating system and turns it into a fully-functioning E-commerce store.

Website Design
WordPress

WordPress is a Content Management System (CMS) for your website. It holds a commanding share of the web and is an easy to use CMS, has an intuitive interface and has vast availability of templates and plugins allowing complex functions to be integrated with ease.

Website Design
Yoast

Yoast is an SEO plugin available for WordPress. Yoast itself has received over a million downloads and when used correctly is guaranteed to improve your on-page SEO.