Technology & Cybersecurity Glossary
If your technology meetings sound like someone reading a bowl of alphabet soup, you are not alone. We translated the complex jargon of IT, cloud infrastructure, and cybersecurity into plain English. Stop nodding along and use this guide to cut through the technical noise so your leadership team can make strategic, informed decisions about your organizational resilience.
Advanced Endpoint Security
Modern protection for laptops, desktops, and servers that goes beyond traditional antivirus software. Instead of relying only on known malware signatures, advanced endpoint security uses behavioral analysis, machine learning, and real-time monitoring to detect suspicious activity before it executes.
- Why it matters: We deploy this technology as the foundation of our Core Defense and Apex Security solutions to protect your workforce, wherever they connect.
Backup and Disaster Recovery (BDR)
The combination of technologies and processes that protect business data and ensure operations can be restored after a disruption. Backups create secure copies of data, while disaster recovery ensures systems, applications, and workflows can be brought back online quickly.
- Our approach: We integrate BDR into our Managed IT and Cloud Infrastructure plans to ensure revenue protection, not just file archival.
Business Continuity
An organization’s ability to continue operating critical functions during and after unexpected disruptions such as cyberattacks, system failures, or natural disasters. It aligns technology, people, and processes to define acceptable downtime and recovery objectives.
-
Strategic alignment: Our Strategic IT Consulting and Compliance & Risk teams help executives build continuity plans that protect reputation and trust.
Cloud Infrastructure
Servers, storage, networking, and computing resources delivered over the internet rather than hosted on-site. Platforms like Microsoft Azure and AWS allow businesses to scale resources up or down as needs change, reducing capital expense and improving flexibility.
- Learn more: Explore how we design scalable environments in our Cloud & Infrastructure and IT Modernization practice areas.
Cloud Migration
The process of moving applications, data, or workloads from on-premise environments to cloud platforms. Successful migrations are planned around business outcomes, accounting for security, compliance, performance, and long-term cost management.
-
See the impact: We manage these transitions through our IT Modernization services to reduce complexity and technical debt.
Co-Managed IT
A shared responsibility model where internal IT teams retain control while CompassMSP provides supplemental expertise, tools, monitoring, and coverage. This prevents burnout and adds critical security capabilities without replacing existing staff.
-
How we partner: We support internal IT directors through our Managed IT and Strategic Consulting divisions.
Compliance
Meeting regulatory and industry requirements that govern how data is protected and systems are managed (e.g., HIPAA, NYDFS 500, PCI DSS, SOC 2). For leadership, compliance is a risk management discipline requiring documented processes and executive oversight.
-
Industry expertise: We provide specialized compliance support for Healthcare, Financial Services, and Legal Services.
Cyber Risk Assessment
An evaluation of an organization’s cybersecurity posture that identifies vulnerabilities, threats, and gaps across people, processes, and technology. The goal is to translate technical findings into business impact and actionable priorities.
-
Start here: Our Cybersecurity Advisory team uses these assessments to build roadmap-driven security strategies.
Cyber Resilience
The ability to prevent, withstand, recover from, and adapt to cyber incidents. It recognizes that not all attacks can be prevented, prioritizing continuity and recovery over the unrealistic goal of perfect prevention.
-
Our strategy: We build resilience into every layer of our Apex Security and Cybersecurity Advisory services.
Endpoint Detection and Response (EDR)
A security capability that continuously monitors endpoints (laptops, servers) for suspicious behavior and enables investigation and response in real time. EDR tools are critical for detecting threats that bypass traditional defenses.
-
Core protection: EDR is a standard component of our Core Defense and Apex Security packages.
Incident Response Plan
A defined strategy outlining how an organization detects, responds to, contains, and recovers from cybersecurity incidents. It clarifies roles, communication protocols, and escalation paths to reduce chaos during high-pressure situations.
-
Executive readiness: Our vCISO Advisory service helps leadership teams build and test these plans before a crisis occurs.
Managed IT Services
A service that combines security technology with human analysts who monitor, investigate, and respond to threats 24/7. Unlike software-only tools, MDR provides active threat hunting and response to reduce dwell time.
-
Advanced defense: MDR is the engine behind our Apex Security solution, providing enterprise-grade protection for mid-market firms.
Multi-Factor Authentication (MFA)
A security control that requires users to verify their identity using more than one factor, such as a password and a mobile prompt. It is one of the highest-impact controls available for reducing credential-based attacks.
-
Implementation: We mandate and manage MFA across all client environments as part of our Cybersecurity Advisory standards.
Security Operations Center (SOC)
A centralized function responsible for continuously monitoring, detecting, and responding to cybersecurity threats. SOCs operate 24/7 to provide visibility across endpoints, networks, and cloud environments.
-
24/7 Coverage: Our US-based SOC powers our Apex Security service, delivering continuous eyes-on-glass monitoring.
vCIO (Virtual Chief Information Officer)
Executive-level technology leadership provided on a flexible basis. A vCIO aligns IT strategy with business goals, budgets, and growth plans, focusing on long-term governance rather than day-to-day support.
-
Strategic value: vCIO guidance is a core pillar of our Strategic IT Consulting and high-level Managed IT engagements.
vCISO (Virtual Chief Information Security Officer)
Security leadership that provides risk management, compliance oversight, and governance without the cost of a full-time executive. The vCISO establishes security strategy, policies, and reporting structures.
-
Governance: Our vCISO Advisory service is essential for regulated organizations in Healthcare and Finance.
Zero Trust
A security model that assumes no user or device should be trusted by default. Every access request is verified based on identity, device health, and context to reduce the impact of compromised credentials.
-
Modern Architecture: We apply Zero Trust principles when designing environments in our Cybersecurity Advisory and Cloud Infrastructure projects.
24/7/365 Monitoring
Continuous observation of systems and security events, including nights, weekends, and holidays. This ensures issues are detected and addressed before they escalate into downtime or data loss.
-
Always on: Continuous monitoring is standard in our Managed IT and Apex Security agreements.
Featured Resources
Explore expert insights, practical tips, and real-world advice from our blog curated to help you make smarter tech decisions.
Cybersecurity Manufacturing Case Study 0 min read
Manufacturing Company Secures Billion-Dollar Supply Chain at Scale with Forensic-Led Cybersecurity
Discover how a manufacturing company enhanced cybersecurity and achieved billion-dollar supply chain resilience through forensic-led strategies, ensuring operational stability and zero insurance claims.
Telecom Healthcare Case Study 0 min read
Southwest Cardiovascular Associates Boosts Patient Experience & Operational Agility with Unified Communications
Southwest Cardiovascular Associates enhances patient experience and operational efficiency through a unified communications solution, achieving significant productivity and first-call resolution improvements.
Telecom eBooks 0 min read