Case studies
We collaborate with a diverse array of organisations across various industries. Discover how we’ve assisted our clients and the successes they’ve achieved.
Does technology talk have you stumped? Do you switch off when you hear terms like ‘DNS filtering’? Fear not! Our handy IT jargon glossary simplifies IT support terms and services.
A
A device that enables computers and other devices equipped with wireless capabilities to connect with a wired network.
An algorithm is a set of well-defined instructions or steps designed to perform a specific task or solve a particular problem.
Antivirus (AV) software is designed to protect computers and mobile devices from malware, viruses, and other cyber threats.
API stands for Application Programming Interface. It is a collection of protocols and tools written in programming languages like C++ or JavaScript, which dictate how two software components should interact. APIs operate in the background, enabling users to find and access the information they seek.
AI, or artificial intelligence, refers to the simulation of human intelligence in machines, particularly computer systems. It operates through algorithms within a computerised system, which are precise sets of instructions that enable a computer to solve problems or perform tasks. Learn about Copilot, Microsoft’s answer to AI.
B
BitDefender is a leading cybersecurity company that develops and delivers a wide range of security products and services.
Business continuity is the capacity of an organisation to maintain critical operations during a disruption, such as a cyberattack or natural disaster. A business continuity plan (BCP) outlines the procedures and protocols an organisation implements to ensure that essential functions proceed with minimal interruption.
Business Intelligence (BI) encompasses the technologies, software, and methodologies employed by companies to gather, examine, and display data. Making decisions based on data is a fundamental principle of BI.
BYOD stands for “Bring Your Own Device,” a policy allowing employees to use their personal devices to connect to their organisation’s network and access work-related resources.
C
Caches are components, either software or hardware, that store data temporarily to fulfill future requests more swiftly and effectively.
The central processing unit (CPU) is the main hardware component of a computer system, tasked with processing and executing instructions and programs. CPUs are situated on the computer’s motherboard.
Is an open language modelling system (AI) owned by Microsoft.
A cookie is a small piece of data that you may be prompted to accept when connecting to certain servers through a web browser. It serves as a means of identification throughout your session and is specific to, and only sent to, the server that created it.
Microsoft Copilot is an AI-powered assistant designed to enhance productivity and streamline workflows by providing contextual assistance, automating routine tasks, and analysing data.
A system designed to assist organisations in managing their relationships with both existing and prospective customers. It encompasses various functions such as reporting, sales management, and contact management, enabling companies to foster and sustain relationships while maximising productivity.
CSS, or Cascading Style Sheets, is a stylesheet language used to define the presentation of a document written in HTML or XML. It allows you to control the layout, colors, fonts, and overall visual appearance of web pages across different devices and screen sizes
Here are some key aspects of CSS:
CSS is an essential tool for web developers to create visually appealing and user-friendly websites
Every time a ticket is resolved, we ask a one question survey, “How did we do on this request?”, so we understand what each end user thinks of the service we have provided. In the industry, anything 98% and over is classed as World Class, and we continually achieve this and often have 100% Customer Satisfaction.
Cyber Essentials is a Government-backed, industry-supported scheme to help organisations protect themselves against 80% of common cyber-attacks. It includes a series of annual checks and technical controls to ensure you are efficiently protected against cyber threats, including hacking, phishing or password attacks. To pass the certification, you will need evidence in support of your answers.
Find out more about how we can get you Cyber Essentials certified.
Cybersecurity is a field within technology dedicated to safeguarding data and devices from malevolent entities. Professionals in cybersecurity employ their technical expertise to evaluate systems, remedy vulnerabilities, and construct secure defenses against damage and theft.
D
The Dark Web is a layer of the Internet, accounting for 6% of the total Internet, that is accessible via specialist browsers. The Dark Web is considered a haven for criminal activity, from the sharing of illegal information to the sale of arms and drugs. Company credentials that are stolen or leaked will find its way onto the dark web, whether freely shared or sold in market places. Employees often use the same password for multiple services on the web, such as CRM, e-commerce sites, and social media exponentially increasing the risk and impact of any breach.
Dark Web Monitoring keeps a close eye on whether your business data is available on the Dark Web, provides you with daily updates of any accounts that are exposed so you can take immediate action averting any threat.
Find out more about our Dark Web Monitoring service.
The Digital Visual Interface (DVI) has three variants DVI-A, DVI-D and DVI-I. There is also the Mini-DVI and Micro-DVI, but these were largely used on early Apple computers. The DVI created in 1999 to supersede the VGA, moved connections from analogue to digital allowing for better picture quality. This connection was superseded quickly and therefore is not as commonly found today.
More information about display ports.
Another widely used connection, it is primarily used to connect a video source to a display device. It’s ability to deliver high-quality video and audio makes it a very popular connection type for professionals and gamers.
There are three core variants; DP 1.2, DP 1.3 and DP 1.4. Each type has slightly different capabilities.
More information about display ports.
DNS (Domain Name System) filtering refers to the process of using DNS to block or redirect specific domain names or internet addresses. This can be done at the network level to prevent access to certain websites or online services, or to redirect traffic to a different location.
DNS filtering is often used to block access to known malicious or unwanted websites, such as those used for phishing or distributing malware.
F
A firewall is a network security device that establishes a barrier between a trusted and an untrusted network. For instance, it can prevent internet traffic from entering your private network. Functioning as a gatekeeper, it manages both incoming and outgoing traffic based on a defined set of security rules.
Fragmentation refers to the dispersal of parts of the same disk file across various areas of a disk. This phenomenon occurs as files are deleted and new ones are added, leading to a scattered file system.
G
A type of artificial intelligence (AI) technology is capable of generating various forms of content, such as images, audio, text, and synthetic data.
GIFShell represents a novel attack method where attackers can transmit malicious files, execute commands, and carry out data exfiltration through GIF images.
1024 x 1024 x 1024 bytes, or 2 to the 30th power, is commonly referred to as a gigabyte. It’s generally adequate to approximate a gigabyte as about one billion bytes or 1000 megabytes.
A Graphical User Interface (GUI) is a type of digital interface that allows users to interact with electronic devices through graphical elements like icons, buttons, and menus.
H
HDD is a physical storage device that uses spinning disks (platters) to store data.
The High-Definition Multimedia Interface (HDMI) connection has been going strong since 2002. It’s ability to transmit high-definition uncompressed video data between devices is the reason everyone swiped right on this connection!
Its developed over the years, becoming smaller and smaller.
More information about display ports.
HyperText Markup Language, or HTML, is a language utilized for creating web pages. It employs a variety of instructions and tags to determine the appearance of the document.
The HyperText Transfer Protocol is a set of rules that govern how a web server and a browser interact. For instance, when you enter a URL in your browser, it sends an HTTP command to the web server, instructing it to fetch and transmit the desired web page.
I
The Internet of Things, commonly known as IoT, constitutes a network of physical objects. These objects are capable of exchanging data autonomously, without the need for human interaction. IoT encompasses more than just computers and machines; it can integrate any item equipped with sensors and a unique identifier (UID).
An Internet Protocol address, commonly known as an IP address, is a numerical label assigned to each computer. It is used for identifying and locating computers on the network as they use the Internet.
This is the only auditable international standard that defines the requirements of an information security management system (ISMS). An ISMS is a set of policies, procedures, processes and systems that manage information risks, such as cyber-attacks, hacks, data leaks or theft. Learn more about ISO 27001.
This certification ensures that a quality management system is in place. The system must meet certain criteria, including strong customer focus, the motivation and implication of top management, the process approach and continual improvement. Learn more about ISO 9001.
M
Malware, short for malicious software, is the most prevalent type of cyberattack targeting businesses and organizations. It is crafted to interfere with and disrupt computer systems, including mobile devices.
Microsoft QuickAssist is a remote access tool that allow users to connect to and control a computer or network from a different location.
Multi-Factor Authentication (MFA), sometimes call 2FA, is an additional layer of security when accessing accounts. Found on most accounts now, from Facebook, X (formerly Twitter), LinkedIn and Microsoft. This process requires you to type in your password AND then authenticate that you are allowing access. This can be done via email, SMS or via an Authenticator application, such as Microsoft Authenticator or Google Authenticator.
N
NIS2 (Network and Information Security version 2) is the latest EU directive that aims to improve the cybersecurity and resilience of organisations that provide particular services. The legislation comes into force on the 18 October 2024. As NIS2 is European legislation, it doesn’t affect all UK businesses, just those trading with or in Europe.
O
Onsite IT support is when technical assistance and troubleshooting services are given to computer users at the office or place of work. This can include setting up new equipment, troubleshooting and repairing hardware and software issues.
An operating system (OS) is the system software that manages computer resources and processes. It is responsible for the computer’s capability to run and execute programs. Operating systems allow you to interact with your computer without requiring knowledge of its language.
OSINT is an acronym for Open Source Intelligence. Essentially gathering and using information freely scattered about the interweb. More information on how OSINT can support your business security strength.
P
Patch management is the process of identifying, downloading, testing, and installing software updates and fixes, commonly known as “patches”, in order to keep software programs and operating systems up-to-date and secure. These patches address security vulnerabilities, fix bugs, and add new features. Patch management typically includes a combination of automated and manual processes.
Effective patch management can help prevent security breaches by closing vulnerabilities that could be exploited by attackers. It can also help keep software running smoothly by addressing bugs and compatibility issues.
Power Apps is a suite of applications, services, and connectors, along with a data platform, that provides a rapid development environment to build custom apps for your business needs.
Power Automate is a cloud-based service from Microsoft that enables users to create automated workflows to streamline and optimise business processes.
Power BI is a powerful business intelligence tool developed by Microsoft. It helps users transform raw data into meaningful insights through interactive visualizations and reports.
Q
Every 3 months our proactive insights and alignment teams will carry out a risk assessment in order to reduce risk and downtime while optimising the IT. They ask the question “what more could we have done to prevent this ticket being needed?”. By analysing, problem-solving and automating on a regular basis ensures customer issues are reduced through Continual Service Improvement (CSI).
R
RAM is the computer’s short-term memory used to temporarily store data for quick access.
A relational database is a digital system that stores information in organised tables, much like spreadsheets, but with special features that make finding, sharing, and updating information safer, quicker, and less prone to errors. Read about relational databases.
Remote access tools allow users to connect to and control a computer or network from a different location. These tools are essential for IT support, remote work, and collaboration.
A router is a device that connects multiple computer networks and directs data traffic between them.
S
SafeSupplier offers a robust, streamlined, consistent and effective supplier on-boarding and management solution, that demonstrates supplier compliance to regulatory requirements, international standards and industry best practice in the supply chain. Select Technology has been awarded verification from SafeSupplier for demonstrating their ethical, environmental and financial credentials, to help clients assess compliance within their supply chain.
The Security Operations Centre (SOC) is responsible for continuously monitoring, preventing, detecting, investigating, and responding to cyber threats. SOC teams safeguard the organization’s assets, such as intellectual property, personnel data, business systems, and brand integrity. With our WorkTogether IT support service, you’ll have a SOC team working to ensure that your business is secure.
A type of computer storage device that uses integrated circuits, like flash memory, to store data. Also see Storage.
A slightly contrived acronyms that businesses all love so much. For more information read about STEP.
Laptop or PC storage come in two forms HDD and SSD.
T
A Technical Account Manager (TAM) acts as a liaison between the customer and the IT provider. The TAM is responsible for ensuring that the company’s technical needs are met and that the services provided by the technical teams are of high quality and align with the company’s goals and objectives. The TAM also acts as a primary point of contact for the company for any technical issues or concerns, and works closely with the company to ensure that all technical matters are handled efficiently and effectively.
U
USB-C is the newest connector available, driven by regulation and reducing costs, is now becoming the standard connection. USB-C is capable of data, video, audio and power transfer. Most new devices will utilise this cable, including future apple devices.
More information about display ports.
User experience (UX) refers to the overall experience a user has when interacting with a product, system, or service. It encompasses all aspects of the user’s interaction, including ease of use, accessibility, and the emotional impact of the experience.
User interface (UI) refers to the point of interaction between a user and a digital device or application. It encompasses all the visual elements and interactive features that enable users to engage with a system effectively.
V
A Virtual Private Network (VPN) is a secure, encrypted internet connection. VPN services are designed to create a protected, private network that ensures the safe transmission of data from network devices.
Virtualization is technology that you can use to create virtual representations of servers, storage, networks, and other physical machines.
Ahh, Video Graphics Array (VGA), nostalgia kicking in now. This connection has been around since 1987, and is extremely common (even today), found on monitors, televisions, projectors and PCs. VGA is an analogue connection, and therefore it has a limited ability to transmit high-definition content. Modern devices are beginning to drop this connection type for newer connectors that are able to transmit high-def content.
More information about display ports.
W
A Wide Area Network (WAN) is a network that spans a broad geographical area. The internet serves as a prime example of a WAN.
A wireframe is a visual guide that represents the skeletal framework of a website, app, or other digital product. It is used in the early stages of design to outline the structure and layout without focusing on visual details like colours or graphics.
We collaborate with a diverse array of organisations across various industries. Discover how we’ve assisted our clients and the successes they’ve achieved.
Read all about the latest news within the industry and Select Technology, and our how to guides all aimed at supporting you in your business.
Watch our two minute tutorials and quickly learn tips and tricks for Teams, PowerPoint, Excel and Outlook.