Consortium

Resources

IT Glossary

Everyday technical terms explained simply, so your whole team speaks the same language.

Antivirus

Software that detects and neutralizes malicious programs on a device before they cause damage.

Multi-Factor Authentication (MFA)

A login method that requires an additional verification beyond your password, such as a code sent by SMS or an app (e.g. Microsoft Authenticator).

Backup

A security copy of your data stored separately, allowing full recovery in the event of a failure, accidental deletion, or incident.

Encryption

A process that makes data unreadable to anyone unauthorized, even if it is intercepted or stolen.

Cloud

Infrastructure of remote servers accessible via the internet. Your files and applications are stored and managed there without additional local hardware.

EDR (Endpoint Detection & Response)

An advanced security tool that monitors devices in real time, detects suspicious behavior, and automatically responds to threats — beyond a simple antivirus.

Phishing

A fraudulent attempt via email or message impersonating a trusted source (bank, Microsoft, colleague) to get you to click a link or reveal your credentials.

Law 25 / Bill 64

Quebec law on personal information protection imposing obligations on organizations regarding confidentiality, incident reporting, and data governance.

Malware

Software designed to damage, spy on, or take control of a device or network without the user's consent.

Microsoft 365 (M365)

Microsoft's cloud office suite grouping Teams, Outlook, Word, Excel, SharePoint, OneDrive and other collaboration tools.

OneDrive

Microsoft's cloud storage service integrated with M365, for saving and sharing files from any device.

Firewall

A device or software that filters incoming and outgoing network traffic according to security rules, blocking unauthorized connections.

Patch

A software update that fixes a security vulnerability or functional issue. Not applying patches exposes the organization to attacks.

Ransomware

Malicious software that encrypts all of an organization's files and demands a ransom to unlock them. One of the most costly cyberthreats.

RMM (Remote Monitoring & Management)

A tool allowing an IT team to monitor, manage, and fix devices remotely, without having to travel on site.

SharePoint

Microsoft's collaborative platform integrated with M365 for storing, organizing, and sharing documents across an organization or team.

Teams (Microsoft Teams)

Microsoft's communication and collaboration app: instant messaging, calls, video conferences, and file sharing all in one interface.

IT Ticket

A support request logged in a management system, allowing the progress of a problem or request to be tracked until resolution.

VPN (Virtual Private Network)

A secure, encrypted connection between a device and a remote network, protecting data in transit — especially when working remotely or on public Wi-Fi.

Zero Trust

A security model where no user or device is considered trusted by default, even inside the organization's network. Every access is verified.