IT Terms Explained in Plain English

A reference guide for Perth business owners. Every term explained as what it does for your business — not what it is called.

Accounts and Access

Terms related to user accounts, login security, and who has access to what in your Microsoft 365 environment.

Accounts and access

A second login step

Multi-factor authentication (MFA) / Two-factor authentication (2FA)

A security setting that requires a second confirmation after entering your password — usually a code sent to your phone. Means a stolen password alone is not enough to access an account. DM1 enables this on every account as standard.

Admin account

Administrator / Global Admin

An account with full control over your Microsoft 365 environment — creating users, changing settings, accessing all data. Should be restricted to authorised people only. DM1 configures a separate emergency admin account (break-glass account) so you are never locked out.

Break-glass account

Emergency access account

A dedicated administrator account kept separate from any individual staff member, used only if the main admin account is compromised or locked. DM1 sets this up for every new client and stores the credentials securely.

Conditional access

Conditional Access Policy

A rule that controls when and how staff can log in. For example: block logins from countries your business has no connection to, or require a second login step when accessing from an unmanaged device. Included in Microsoft 365 Business Premium.

Least privilege access

Role-based access control (RBAC)

The principle that every staff member should have access only to the data and systems they need for their job — nothing more. DM1 configures SharePoint permissions and Microsoft 365 roles so access is granted by role, not given to everyone by default.

Single sign-on

SSO

A system that lets staff log in once and access multiple applications without logging in again separately. Microsoft 365 provides single sign-on across all Microsoft apps and many third-party services.

Stale account / orphaned account

Inactive user account

A Microsoft 365 account that is still active but belongs to a staff member who has left the business. A common security risk — DM1 finds active stale accounts in the majority of new client onboarding reviews.

Email and Communication

Terms related to business email, email security, and how your emails are authenticated and protected.

Email and communication

Email authentication settings

SPF, DKIM, and DMARC records

Three DNS settings that prove to other email services that your emails are genuine — not fake emails sent by someone pretending to be you. Without them, your domain can be used to send fraudulent invoices or phishing emails to your clients. DM1 configures all three as standard.

Email archiving

Exchange Online Archiving / In-Place Archive

A feature that automatically moves older emails to a separate archive mailbox, keeping your main inbox uncluttered while ensuring all emails are retained for compliance purposes. Available in Microsoft 365 Business Premium through Microsoft Purview.

Email encryption

Transport Layer Security (TLS) / Message encryption

A security feature that scrambles the contents of an email so it cannot be read if intercepted in transit. Microsoft 365 encrypts all emails in transit as standard. Additional message encryption can be applied to specific sensitive emails.

Phishing

Phishing / Spear phishing

An email designed to look like it comes from a trusted source — Microsoft, the ATO, a bank, or a known supplier — to trick someone into clicking a link and entering their login details on a fake page. The most common way business accounts are compromised.

Spam filtering

Microsoft Defender for Office 365 / Exchange Online Protection

Automated filtering that screens emails before they arrive in your inbox, blocking known malicious content, suspicious links, and impersonation attempts. Included in Microsoft 365 Business plans.

Tenant

Microsoft 365 tenant

Your organisation's private instance of Microsoft 365 — the environment that contains all your user accounts, emails, SharePoint sites, Teams, and settings. Completely separate from other organisations' environments. DM1 manages your tenant as your Microsoft CSP partner.

Devices and Endpoints

Terms related to the computers, phones, and other devices your staff use for work — and how they are managed and secured.

Devices and endpoints

Device management

Microsoft Intune / Mobile Device Management (MDM)

A system that lets DM1 configure, monitor, and manage every device used for work — laptops, desktops, phones, and tablets — from a central console. Included in Microsoft 365 Business Premium. Enables remote wipe if a device is lost or stolen.

Device encryption

BitLocker / FileVault

A feature that scrambles the data on a device's hard drive so it cannot be read without the correct login credentials. If an encrypted laptop is stolen, the data on it is inaccessible. DM1 enables device encryption on all managed devices as standard.

Endpoint

Endpoint

Any device that connects to your business network or Microsoft 365 environment — laptops, desktops, phones, tablets. The term is used in security contexts because each device is a potential entry point for an attacker.

Endpoint protection

Microsoft Defender for Business / Endpoint Detection and Response (EDR)

Security software that runs on every managed device, monitoring for suspicious activity, blocking known malicious software, and alerting DM1 if something needs attention. Included in Microsoft 365 Business Premium — no separate antivirus product required for managed devices.

End of support

End of Life (EOL) / End of Support (EOS)

The date after which a software product or operating system no longer receives security updates from its manufacturer. A device running end-of-support software is no longer receiving patches for known vulnerabilities. Windows 10 reached end of support in October 2025.

Remote wipe

Remote wipe / Selective wipe

The ability to erase all data from a device remotely — for example, if a staff member's laptop is stolen. Requires the device to be enrolled in Microsoft Intune. DM1 can perform a remote wipe on any managed device within minutes of a loss being reported.

Security baseline

Security configuration baseline

A standard set of security settings applied to every managed device — screen lock, encryption, automatic updates, endpoint protection. DM1 deploys a security baseline across all managed devices so every machine meets the same standard regardless of when it was set up.

Data, Storage and Recovery

Terms related to where your business data lives, how it is protected, and how it can be recovered if something goes wrong.

Data, storage and recovery

Geo-redundant storage

Geo-redundant storage (GRS) / Geo-redundancy

Data stored across multiple datacentres in different geographic locations, so that a failure at one location does not affect your data. Microsoft 365 uses geo-redundant storage by default — your data is distributed across Microsoft's datacentres automatically.

OneDrive

Microsoft OneDrive for Business

Personal cloud storage for each staff member in your Microsoft 365 environment. The equivalent of a local Documents folder, but stored securely in the cloud and accessible from any device. DM1 configures default save locations to point to OneDrive rather than local drives.

Ransomware

Ransomware

A type of malicious software that encrypts your files and demands payment for the key to unlock them. Microsoft 365 includes a ransomware detection and recovery feature for files stored in SharePoint and OneDrive. DM1 also monitors managed devices for ransomware behaviour patterns.

Recovery point

Recovery Point Objective (RPO)

How much data your business can afford to lose in a worst-case scenario. For businesses on Microsoft 365, SharePoint and Exchange Online store data continuously — there is no scheduled snapshot. Version history means most files can be recovered to a point minutes before a problem occurred.

Recovery time

Recovery Time Objective (RTO)

How long your business can afford to be without access to its systems. For cloud-first businesses on Microsoft 365, there is no server to restore — staff work from another device and data is immediately accessible. Recovery time in most scenarios is the time to provision a replacement device.

Retention policy

Microsoft Purview retention policy

A rule that determines how long data is kept and what happens to it afterwards. DM1 configures retention policies through Microsoft Purview to match your industry requirements — ensuring data is kept for as long as the law requires and deleted or de-identified when no longer needed.

SharePoint

Microsoft SharePoint Online

Microsoft's shared document management platform — where team files, operational documents, and shared business content should live. Included in Microsoft 365 Business plans. DM1 structures SharePoint sites and configures permissions for every new client.

Version history

Document versioning

SharePoint and OneDrive automatically save previous versions of every document — up to 500 versions. If a file is accidentally overwritten, corrupted, or edited incorrectly, any earlier version can be restored in seconds. No separate backup product required for this scenario.

Security and Threats

Terms related to cybersecurity threats, protective measures, and how attacks happen — explained without the jargon.

Security and threats

Attack surface

Attack surface

Every account, device, application, and connection that could potentially be exploited by an attacker. The more accounts, devices, and services your business has, the larger the attack surface. Good security management reduces the attack surface — disabling unused accounts, removing unnecessary software, and applying security baselines.

Business email compromise

Business Email Compromise (BEC)

An attack where a criminal gains access to a business email account and uses it to send fraudulent instructions — typically fake invoices or payment redirection requests — to clients or suppliers. Often goes undetected for weeks. A second login step on all accounts is the primary defence.

Credential stuffing

Credential stuffing

An attack where stolen username and password combinations from one breached service are automatically tried against other services. Works because people reuse passwords. Defeated by using unique passwords for every service — a business password manager makes this practical.

Dark web

Dark web / dark net

A part of the internet not indexed by search engines, accessible only through specialist software. Stolen business credentials and personal data are frequently bought and sold on dark web marketplaces. DM1 can check whether your business email addresses appear in known credential breaches.

Firewall

Firewall / network firewall

A security system that monitors and controls network traffic — blocking unauthorised connections while allowing legitimate ones. Modern Microsoft 365 environments rely primarily on identity-based security rather than traditional network firewalls, but firewalls remain relevant for businesses with on-premises infrastructure.

Malware

Malware / malicious software

Any software designed to cause harm — including viruses, ransomware, spyware, and trojans. Delivered primarily through email attachments, malicious links, and unpatched software vulnerabilities. Microsoft Defender for Business, included in Microsoft 365 Business Premium, provides protection on all managed devices.

Social engineering

Social engineering

Manipulating people into taking actions they should not take — clicking a link, revealing a password, approving a payment. Most cyberattacks use social engineering at some point. Staff awareness is the primary defence: knowing what suspicious requests look like and how to verify them.

Zero-day vulnerability

Zero-day exploit

A security vulnerability in software that is exploited by attackers before the software manufacturer has released a fix. The risk is reduced by keeping all software up to date and by using endpoint protection that can detect unusual behaviour even for unknown threats.

Networking and Connectivity

Terms related to your internet connection, business phone system, and how your network is structured.

Networking and connectivity

Business-grade internet

Business NBN / Ethernet / fixed-line broadband

An internet connection with a higher service level agreement than a consumer plan — meaning faults are repaired faster and the connection is more reliable. DM1 arranges business internet connections for Perth clients and handles the setup without the client needing to deal with the provider directly.

Cloud phone system

Hosted PBX / VoIP phone system

A business phone system that routes calls over your internet connection rather than traditional phone lines. Supports multiple handsets and mobile devices, call routing, voicemail to email, and auto-attendant. DM1 sets up and manages cloud phone systems including number porting.

DNS

Domain Name System (DNS)

The system that translates domain names (yourbusiness.com.au) into the addresses computers use to find each other. DNS settings control where your emails go, which services are connected to your domain, and how your website resolves. DM1 manages DNS for all client domains.

Domain name

Domain name

The address your business uses on the internet — for example, yourbusiness.com.au. Should always be registered in your business's name, not your IT provider's. DM1 manages domain registrations for clients and never registers domains in DM1's own name.

IP address

IP address (Internet Protocol address)

A unique numerical address assigned to a device or service on a network. Used to identify where traffic comes from and goes to. Microsoft 365 login reports show IP addresses for every login — unusual IP addresses from unexpected countries are a sign of account compromise.

VPN

Virtual Private Network (VPN)

A system that creates an encrypted connection between a device and a network, making it appear as though the device is on that network. Used to protect connections over public Wi-Fi and to access systems that require a specific network location. Less commonly needed for cloud-first businesses on Microsoft 365.

Microsoft 365 and Licensing

Terms related to Microsoft 365 plans, licensing, and the tools included in your subscription.

Microsoft 365 and licensing

Business Premium

Microsoft 365 Business Premium

The highest tier of Microsoft 365 for small and medium businesses. Includes everything in Business Standard plus enterprise-grade security tools — Microsoft Defender for Business, Intune device management, Microsoft Purview compliance tools, and Azure Active Directory Premium. DM1's recommended licence for most Perth SMBs.

Business Standard

Microsoft 365 Business Standard

The mid-tier Microsoft 365 plan. Includes business email, Teams, SharePoint, OneDrive, and the full Office suite. Does not include the advanced security and device management tools in Business Premium. Suitable for businesses with simpler security requirements.

Conditional Access

Azure Active Directory Conditional Access

A feature in Microsoft 365 Business Premium that controls login rules — for example, blocking logins from overseas, requiring a second login step for admin accounts, or restricting access from unmanaged devices. DM1 configures Conditional Access policies for every Business Premium client.

CSP

Microsoft Cloud Solution Provider (CSP)

A Microsoft partner programme that allows providers like DM1 to manage Microsoft 365 licences on behalf of clients. As a CSP partner, DM1 can add, remove, and change licences directly, and has access to Microsoft support escalation paths.

Intune

Microsoft Intune

Microsoft's device management platform, included in Microsoft 365 Business Premium. Lets DM1 configure, monitor, and secure every managed device from a central console — enforcing security settings, deploying software, and remotely wiping devices if lost or stolen.

Purview

Microsoft Purview

Microsoft's compliance and data governance platform, included in Microsoft 365 Business Premium. Used by DM1 to configure retention policies, audit logging, data classification, and eDiscovery. The tool that implements the technical side of Privacy Act compliance obligations.

Tenant

Microsoft 365 tenant

Your organisation's private instance of Microsoft 365. Contains all your user accounts, emails, SharePoint sites, Teams channels, and settings. Completely separate from other organisations. The tenancy is owned by your business — not by your IT provider.

Compliance and Privacy

Terms related to Australian privacy law, data compliance obligations, and the regulatory framework that applies to Perth businesses.

Compliance and privacy

Australian Privacy Principles

APPs — Privacy Act 1988 (Cth)

The 13 principles that govern how organisations must handle personal information in Australia. They cover collection, use, storage, disclosure, security, and individual access rights. The Privacy Act applies to most businesses with annual turnover above $3 million and to some smaller businesses regardless of turnover.

Data breach

Eligible data breach / Notifiable data breach

An incident where personal information is accessed, disclosed, or lost in a way that is likely to cause serious harm to one or more individuals. Notifiable breaches must be reported to the Office of the Australian Information Commissioner and affected individuals as soon as practicable.

De-identification

De-identification / anonymisation

The process of removing or altering personal information so that an individual can no longer be identified. The Privacy Act requires personal information to be de-identified or destroyed when it is no longer needed for the purpose it was collected.

eDiscovery

Electronic discovery (eDiscovery)

The process of identifying, collecting, and producing electronically stored information in response to a legal obligation — for example, a court order or regulatory investigation. Microsoft Purview includes eDiscovery tools that allow DM1 to search and export specific data from your Microsoft 365 environment.

Legal hold

Litigation hold / preservation hold

A setting that prevents specific data from being deleted or modified, typically applied when legal proceedings are anticipated or underway. Microsoft Purview allows DM1 to place legal holds on specific mailboxes or SharePoint content.

OAIC

Office of the Australian Information Commissioner (OAIC)

The Australian government agency responsible for privacy and freedom of information. Receives and investigates privacy complaints, conducts assessments of organisations' privacy practices, and can issue determinations and penalties. Notifiable data breach reports are submitted to the OAIC.

Reasonable steps

Reasonable steps — APP 11

The standard required by the Privacy Act for protecting personal information. Not a fixed checklist — assessed against what was reasonable for a business of your size, in your industry, given the type of information you hold. For most Perth SMBs, reasonable steps include: second login steps, role-based access, retention policies, device encryption, and audit logging.

Retention period

Data retention period

The length of time personal information or business records must be kept before they can be destroyed or de-identified. Varies by industry and record type — tax records (5 years), employment records (7 years), healthcare records (7 years for adults). DM1 configures Purview retention policies to match your obligations.

A Term Not Listed Here?

DM1 explains IT in plain English to Perth business owners every day. If you have come across a term that is not covered here, call us — we will give you a straight answer. (08) 6202 6012

Need IT help? Chat with us
DM1
DM1 Assistant
Perth IT Support Guide
Scroll to Top