Reference Guide

IT, security & compliance
terms explained

Plain-English definitions of the terms that come up most in IT, cybersecurity, compliance, and AI. No jargon. No fluff.

Compliance & Regulations Cybersecurity IT Management Artificial Intelligence

General Data Protection Regulation

GDPR

The EU's primary data protection law. It applies to any organisation processing personal data of people in the EU or EEA, regardless of where the organisation is based. Key obligations include identifying a lawful basis for processing, completing data protection impact assessments for high-risk activities, notifying breaches within 72 hours, and respecting eight data subject rights. Fines reach up to €20 million or 4% of global annual turnover, whichever is higher.

GDPR compliance guide →

Network and Information Security Directive 2

NIS2

The EU's updated cybersecurity directive, which replaced the original NIS Directive in October 2024. It applies to a wider range of sectors than its predecessor, including healthcare, financial market infrastructure, digital infrastructure, and managed service providers. NIS2 requires organisations to implement risk management measures, report significant incidents within 72 hours, and places direct accountability on senior management for compliance failures. Fines for essential entities reach up to €10 million or 2% of global turnover.

NIS2 compliance services →

Digital Operational Resilience Act

DORA

An EU regulation applying to financial entities and their critical ICT service providers, effective from January 2025. DORA requires financial firms to demonstrate they can withstand, respond to, and recover from ICT-related disruptions. Its five pillars are: ICT risk management, incident classification and reporting, digital operational resilience testing, third-party ICT risk management, and information sharing. Financial institutions that cannot demonstrate resilience face supervisory action.

DORA compliance services →

ISO 27001

The international standard for information security management systems (ISMS). Achieving certification demonstrates that an organisation has implemented systematic controls to protect its information assets. The 2022 revision covers 93 controls across four themes: organisational, people, physical, and technological. Certification is granted by an accredited third-party body following an independent audit, and must be renewed through regular surveillance and recertification audits every three years.

ISO 27001 certification support →

Payment Card Industry Data Security Standard

PCI DSS

A global security standard that applies to any organisation storing, processing, or transmitting payment card data. Maintained by the PCI Security Standards Council, it covers 12 core requirements across network security, access control, encryption, monitoring, and vulnerability management. Version 4.0, effective from March 2024, places greater emphasis on customised implementation and continuous security. Non-compliance can result in fines from card brands, higher transaction fees, and suspension of card processing privileges.

Audits and Compliance services →

Data Security and Protection Toolkit

DSPT

A self-assessment tool required by NHS England for organisations that access or process health and social care data. It maps to the National Data Guardian's ten data security standards and requires annual evidence submission across areas including staff training, access controls, data sharing agreements, and business continuity arrangements. Submission is mandatory for NHS trusts, GP practices, and any supplier organisation with access to NHS patient data.

Audits and Compliance services →

Data Protection Impact Assessment

DPIA

A structured analysis required under GDPR when a processing activity is likely to result in a high risk to individuals' rights and freedoms. DPIAs assess the nature and purpose of the processing, evaluate necessity and proportionality, and document measures to mitigate identified risks. They must be completed before processing begins. If a residual high risk cannot be mitigated, the relevant supervisory authority must be consulted before proceeding.

Audits and Compliance services →

Records of Processing Activities

RoPA

A documented inventory required under Article 30 of GDPR for most organisations that process personal data. The RoPA records what personal data is processed, the purposes of processing, who has access to it, where data is transferred, and how long it is retained. It is a core audit readiness document and a prerequisite for any GDPR compliance programme. Supervisory authorities can request to inspect it at any time.

GDPR compliance guide →

Data Protection Officer

DPO

A formally designated role required under GDPR for public authorities, organisations carrying out large-scale systematic monitoring of individuals, and those processing sensitive data at scale. The DPO monitors internal compliance, advises on DPIAs, cooperates with supervisory authorities, and acts as a contact point for data subjects. DPOs must have expert knowledge of data protection law, cannot be dismissed for performing their tasks, and must be able to operate independently of management.

GDPR compliance guide →

Lawful Basis

One of six legal grounds that must be identified before processing personal data under GDPR. The six bases are: consent, contract performance, legal obligation, vital interests, public task, and legitimate interests. Organisations must determine and document the correct lawful basis for each processing activity before it begins, and must communicate it to data subjects. Choosing the wrong basis does not make processing lawful retrospectively.

GDPR compliance guide →

Cyber Essentials

A UK government-backed certification scheme designed to protect organisations against the most common internet-based threats. It covers five technical controls: firewalls, secure configuration, user access control, malware protection, and patch management. Cyber Essentials Plus includes an independently verified technical audit of the same controls. Certification is required for certain UK government contracts and is a widely recognised baseline for cyber risk management.

Cybersecurity services →

EU AI Act

The EU's comprehensive regulation on artificial intelligence, adopted in 2024 and coming into effect in phases through 2027. It classifies AI systems by risk level: unacceptable risk (prohibited), high risk (regulated), limited risk (transparency obligations), and minimal risk (no requirements). High-risk AI systems, such as those used in recruitment, credit scoring, medical devices, or critical infrastructure, face conformity assessments, technical documentation requirements, and mandatory human oversight. Certain AI applications are prohibited outright, including real-time biometric surveillance in public spaces.

AI consultancy services →

NIST Cybersecurity Framework

NIST CSF

A voluntary cybersecurity framework published by the US National Institute of Standards and Technology, widely adopted globally as a reference architecture for security programmes. The NIST CSF organises security activities into five core functions: Identify, Protect, Detect, Respond, and Recover. Version 2.0, released in 2024, added a sixth function, Govern, and broadened scope beyond critical infrastructure to all organisations. While not a regulation, NIST CSF is referenced in ISO 27001 gap analyses, used by EU and UK regulators as a benchmark, and adopted by many enterprises as their core security reference framework.

Cybersecurity services →

Financial Conduct Authority

FCA

The UK's financial services regulator, responsible for overseeing around 50,000 firms including banks, insurers, investment firms, and payment service providers. From a technology and security perspective, the FCA expects firms to maintain operational resilience, manage outsourcing and third-party risk, protect customer data, and report material operational incidents promptly. FCA expectations overlap significantly with DORA for firms operating across both UK and EU jurisdictions, though the two frameworks have distinct requirements and timelines.

Audits and Compliance services →

Risk Register

A documented record of an organisation's identified risks, including their likelihood, potential impact, owner, and planned treatment. Risk registers are a core requirement of ISO 27001, NIS2, DORA, and most compliance frameworks. An effective risk register is a living document, reviewed and updated regularly rather than produced once for an audit. It enables organisations to prioritise remediation based on exposure, demonstrate a risk-based approach to auditors, and track whether controls are reducing risk over time.

Audits and Compliance services →

Internal Audit

An independent, structured review of an organisation's controls, processes, and risks, carried out by an internal or contracted team rather than an external certification body. Internal audits are a core requirement of ISO 27001 and most compliance frameworks, providing management with assurance that controls are operating effectively between external assessments. An effective internal audit programme covers a defined scope, evidence-based testing, clear findings with risk ratings, and a tracked remediation plan. For organisations preparing for external certification, a pre-audit internal review significantly reduces the risk of unexpected findings.

Audits and Compliance services →

Penetration Testing

An authorised, simulated attack on an organisation's systems, networks, or applications, carried out by security specialists to identify vulnerabilities before real attackers can exploit them. Unlike automated vulnerability scanning, penetration testing involves active exploitation attempts and creative thinking to chain weaknesses together. The output is a prioritised report of findings with remediation guidance. Penetration testing is required for PCI DSS compliance and recommended as part of any mature security programme.

Cybersecurity services →

Vulnerability Assessment

A systematic review of an organisation's systems, networks, and applications to identify known security weaknesses, without attempting to exploit them. Results are categorised by severity and presented with remediation recommendations. Vulnerability assessments are typically faster and less invasive than penetration tests and are suited to regular, scheduled scanning. They are a requirement under Cyber Essentials, ISO 27001, and PCI DSS.

Cybersecurity services →

Security Information and Event Management

SIEM

A security platform that aggregates and analyses log data from across an organisation's IT environment in real time. SIEM tools correlate events from multiple sources, such as firewalls, endpoints, identity providers, and cloud services, to detect patterns that indicate threats. They generate alerts for security teams and provide forensic data for incident investigations. Continuous monitoring through a SIEM is required or explicitly recommended under NIS2, ISO 27001, and PCI DSS.

Cybersecurity services →

Zero Trust

A security model based on the principle of never trust, always verify. Rather than granting broad access after a single authentication event, Zero Trust requires continuous verification of identity, device health, and access rights for every request, regardless of whether it originates inside or outside the network perimeter. It is particularly relevant in cloud-first and hybrid-working environments where a traditional network boundary no longer exists, and is endorsed as an architectural approach by the UK NCSC and CISA.

Cybersecurity services →

Ransomware

Malicious software that encrypts a victim's files or systems and demands payment in exchange for the decryption key. Modern ransomware attacks, often referred to as double extortion, also involve data exfiltration, with attackers threatening to publish stolen data publicly if payment is not made. Healthcare and financial services organisations are among the most frequently targeted sectors due to the sensitivity of the data they hold and the operational consequences of downtime.

Cybersecurity services →

Multi-Factor Authentication

MFA

An authentication method that requires users to provide two or more verification factors before accessing a system or application. Factors fall into three categories: something you know (a password), something you have (an authenticator app or hardware token), and something you are (biometrics). MFA significantly reduces the risk of account compromise from phishing and credential theft. It is a core requirement of Cyber Essentials, PCI DSS, and most modern security frameworks.

Cybersecurity services →

Phishing

A social engineering attack in which attackers impersonate a trusted entity to trick individuals into disclosing credentials, clicking malicious links, or transferring funds or data. Spear phishing targets specific individuals with personalised messages, while whaling focuses on senior executives. Phishing is the most common initial access vector in data breaches. Effective mitigation combines email filtering, MFA, and regular security awareness training across the organisation.

Cybersecurity services →

Incident Response

The structured process an organisation follows to detect, contain, investigate, and recover from a security incident. An effective incident response plan defines roles, escalation paths, communication templates, and recovery procedures, and should be tested through regular tabletop exercises. Under GDPR, organisations must notify their supervisory authority of certain breaches within 72 hours. Under NIS2, significant incidents must be reported within 24 hours (initial notification) and 72 hours (full report).

Cybersecurity services →

Attack Surface

The total set of potential entry points through which an attacker could attempt to gain unauthorised access to an organisation's systems or data. This includes external-facing applications, user accounts, APIs, cloud services, third-party integrations, and physical access points. Understanding and reducing the attack surface is a foundational element of any security programme, achieved through asset inventory, network segmentation, access control, and decommissioning unused systems.

Cybersecurity services →

Supply Chain Attack

A cyberattack that targets an organisation indirectly by compromising a trusted third-party supplier, software vendor, or service provider. Attackers exploit the trust and access that suppliers have within a target's environment to gain a foothold they could not obtain through a direct attack. The SolarWinds and MOVEit incidents are prominent examples. Third-party risk management is a specific requirement under NIS2 and ISO 27001 Annex A.

Cybersecurity services →

Data Breach

An incident in which personal data is accessed, disclosed, altered, or destroyed without authorisation, whether as a result of a cyberattack, human error, or system failure. Under GDPR, organisations must notify their supervisory authority within 72 hours of becoming aware of a breach that is likely to result in a risk to individuals' rights and freedoms. Affected individuals must also be notified without undue delay where the breach is likely to result in a high risk. Breaches can result in regulatory fines, civil claims, and lasting reputational damage.

GDPR compliance guide →

Identity and Access Management

IAM

The discipline of managing who can access which systems, data, and resources within an organisation, and under what conditions. IAM encompasses user provisioning and deprovisioning, role-based access control, privileged access management, multi-factor authentication, and single sign-on. Poor IAM is one of the most common causes of breaches: compromised credentials, over-privileged accounts, and orphaned access from former employees all create exploitable weaknesses. IAM controls are required under ISO 27001, Cyber Essentials, PCI DSS, and most other security frameworks.

Cybersecurity services →

Third-Party Risk Management

The process of identifying, assessing, and managing the security and compliance risks introduced by suppliers, vendors, cloud providers, and other external parties with access to an organisation's systems or data. Third-party risk management is explicitly required under NIS2, DORA, ISO 27001, and PCI DSS. An effective programme covers vendor due diligence during procurement, contractual security requirements, data processing agreements where personal data is involved, and ongoing monitoring of critical suppliers. Supply chain attacks have made third-party risk one of the fastest-growing areas of regulatory focus.

Cybersecurity services →

IT Infrastructure Library

ITIL

A globally recognised framework of best practices for IT service management, covering the full IT service lifecycle from strategy and design through to operation and continual service improvement. ITIL v4, the current version, introduces a more flexible, value-focused approach built around a service value chain, four dimensions of service management, and a set of guiding principles. ITIL certifications are held by IT professionals across service desk, change management, and operations roles worldwide.

IT Management services →

Service Level Agreement

SLA

A formal agreement between a service provider and a customer that defines the expected level of service, including availability targets, response times, resolution times, and support hours. SLAs set clear accountability for service performance and form the basis for measuring whether IT is meeting business needs. For managed IT environments, SLAs typically distinguish between response time (time to acknowledge an issue) and resolution time (time to fix it), often tiered by priority level.

IT Management services →

Recovery Time Objective

RTO

The maximum acceptable length of time that a system, application, or business function can be offline following a disruption before the impact becomes unacceptable to the business. RTO is a key parameter in business continuity and disaster recovery planning, and informs decisions about redundancy architecture, failover mechanisms, and recovery procedures. Different systems will have different RTO requirements, and these should be documented and reviewed regularly.

IT Management services →

Recovery Point Objective

RPO

The maximum amount of data loss an organisation can tolerate in the event of a failure, expressed as a time window. An RPO of four hours means up to four hours of transactions or changes could be lost. RPO determines how frequently backups must be taken and directly informs technology choices around replication, journalling, and off-site backup. Organisations with very low RPO requirements, such as banks or healthcare systems, typically require near-continuous data protection solutions.

IT Management services →

Managed Services

An arrangement in which an external provider takes ongoing responsibility for managing specific IT functions, systems, or processes on behalf of an organisation, governed by an SLA. Common coverage includes endpoint management, network monitoring, backup and recovery, helpdesk support, and patch management. Managed services allow organisations to access consistent specialist expertise and predictable costs without the overhead of building equivalent in-house capability.

IT Management services →

Patch Management

The process of identifying, acquiring, testing, and deploying software updates to address security vulnerabilities, fix bugs, and maintain compatibility. Effective patch management is one of the five core controls required by Cyber Essentials and a requirement under ISO 27001 and PCI DSS. Unpatched systems are consistently among the most common causes of successful cyberattacks, including many ransomware incidents, making patch management a foundational security control.

IT Management services →

IT Strategy

A plan that defines how technology will support and advance an organisation's business objectives over a defined period, typically three to five years. An IT strategy covers infrastructure investment, cloud adoption, tooling decisions, vendor relationships, skills development, and cost management. Without a strategy, IT spending tends to be reactive, fragmented, and hard to justify at board level.

IT Management services →

Governance, Risk, and Compliance

GRC

A structured approach to aligning IT operations with business goals, managing risk, and meeting regulatory obligations in an integrated way. Rather than treating governance, risk management, and compliance as separate workstreams, GRC frameworks bring them together under a single model. Common GRC activities include policy management, risk registers, control testing, and audit evidence collection. Organisations with mature GRC programmes typically respond faster to audits and spend less on remediation.

Audits and Compliance services →

Cloud Computing

The delivery of computing resources, including servers, storage, databases, networking, software, and analytics, over the internet on a pay-as-you-use basis. The three primary service models are Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Cloud adoption can reduce capital expenditure and improve scalability, but introduces its own challenges around cost management, security configuration, and data residency compliance.

IT Management services →

IT Support

The provision of technical assistance to end users experiencing problems with hardware, software, connectivity, or access. IT support is typically structured in tiers: first-line handles common requests and password resets, second-line deals with more complex issues, and third-line involves specialist or vendor escalation. Effective IT support is governed by SLAs, measured through ticket metrics, and supported by a knowledge base that reduces repeat incidents over time.

IT Management services →

IT Monitoring

The continuous observation of IT systems, servers, networks, applications, and services to detect performance issues, failures, and security events in real time. Good monitoring reduces mean time to detect (MTTD) and mean time to resolve (MTTR) incidents, and provides the data needed to prove SLA compliance. Monitoring tools generate alerts, dashboards, and audit logs. For regulated organisations, monitoring records are also required as evidence for compliance frameworks including ISO 27001 and NIS2.

IT Management services →

IT Budgeting

The process of planning, forecasting, and managing IT expenditure across capital (CAPEX) and operational (OPEX) categories. An effective IT budget accounts for hardware refresh cycles, software licensing, cloud consumption, support contracts, and project delivery costs. Many organisations overspend on unused licences, underutilised cloud resources, and unplanned emergency work that a structured budget would have anticipated. Clear budgeting also enables the business to evaluate the return on IT investment over time.

IT Management services →

IT Infrastructure

The combined set of hardware, software, networks, and facilities that underpin an organisation's IT environment. Infrastructure includes servers (physical and virtual), storage systems, network devices, endpoints, data centres or colocation facilities, and the cloud services that extend or replace them. Infrastructure must be actively managed: patched, monitored, capacity-planned, and reviewed against business requirements. Neglected infrastructure is a common source of both security incidents and unplanned downtime.

IT Management services →

Disaster Recovery

DR

A documented plan and set of procedures for restoring IT systems and operations following a disruptive event such as a ransomware attack, hardware failure, flood, or power outage. A disaster recovery plan documents RTO and RPO targets for each critical system, recovery sequences, team responsibilities, and communication protocols. Plans must be tested regularly: untested recovery procedures frequently fail under real conditions, and the failure is only discovered when it matters most.

IT Management services →

IT Asset Management

ITAM

The process of tracking and managing an organisation's IT assets throughout their full lifecycle, from procurement through to decommissioning. ITAM covers hardware, software licences, cloud subscriptions, and virtual assets. A complete asset register is a prerequisite for ISO 27001 certification and a foundational security control, since you cannot protect or patch what you cannot see. ITAM also identifies licence waste, avoids software audit penalties, and supports more accurate IT budgeting decisions.

IT Management services →

Machine Learning

ML

A branch of artificial intelligence in which systems learn from data to improve their performance on a task without being explicitly programmed for every scenario. Models are trained on historical data to identify patterns, make predictions, or classify inputs. Common business applications include demand forecasting, fraud detection, churn prediction, and anomaly detection. The quality of a model's outputs depends directly on the quality and representativeness of the data it is trained on.

AI consultancy services →

Large Language Model

LLM

A type of AI model trained on large volumes of text data to understand and generate human language. LLMs can perform a wide range of language tasks including summarisation, drafting, translation, question answering, and code generation. They form the foundation of tools like Microsoft Copilot, ChatGPT, and similar enterprise AI applications. Deploying LLMs safely in a business context requires controls around data access permissions, output accuracy validation, and compliance with applicable regulations including the EU AI Act.

AI consultancy services →

Generative AI

AI systems that create new content, including text, images, code, audio, and video, based on patterns learned from training data. Generative AI tools have moved rapidly into enterprise use cases across content creation, customer service, software development, and data analysis, and productivity gains can be significant. However, organisations must address risks around data leakage, output accuracy, intellectual property ownership, and regulatory compliance before any production deployment.

AI consultancy services →

Natural Language Processing

NLP

A branch of AI that enables computers to understand, interpret, and generate human language. NLP powers applications including chatbots, document classification, sentiment analysis, machine translation, and voice assistants. Large language models are a recent and particularly powerful form of NLP. In regulated sectors, NLP is used to automate document review, extract data from unstructured records, and route customer communications, raising questions about accuracy, bias, and auditability that governance frameworks must address.

AI consultancy services →

Computer Vision

A field of AI that enables systems to interpret and act on visual information from images, video, and cameras. Applications include quality control, facial recognition, object detection, document digitisation, and medical imaging analysis. In regulated sectors, computer vision deployments require careful attention to data protection obligations, particularly where biometric data or patient imagery is involved. The EU AI Act classifies certain computer vision applications, including real-time biometric surveillance in public spaces, as prohibited or high-risk.

AI consultancy services →

Robotic Process Automation

RPA

Software that automates repetitive, rules-based digital tasks by mimicking how a human interacts with applications: navigating interfaces, copying and pasting data, submitting forms, and triggering workflows. RPA is effective for structured, predictable processes but cannot handle exceptions or unstructured inputs without additional logic. Combining RPA with machine learning extends its reach into less structured work, a combination increasingly referred to as intelligent automation. Common use cases include invoice processing, data entry, report generation, and compliance evidence collection.

AI consultancy services →

AI Security

The practice of identifying and mitigating security risks specific to AI systems and the infrastructure that supports them. AI introduces attack vectors beyond traditional IT security: prompt injection (manipulating model outputs via crafted inputs), model poisoning (corrupting training data), data extraction (recovering sensitive information through model queries), and adversarial inputs designed to cause misclassification or harmful outputs. Organisations deploying AI in production must assess these risks, implement appropriate controls, and include AI systems in their broader security testing and incident response programmes.

AI consultancy services →

AI Governance

The frameworks, policies, and controls that ensure AI systems are developed and used responsibly, safely, and in compliance with legal and ethical standards. AI governance covers risk assessment, model documentation, transparency, human oversight, accountability, and bias management. It is explicitly required for high-risk AI systems under the EU AI Act and is increasingly expected as a baseline practice for any organisation deploying AI in a business-critical or customer-facing context.

AI governance services →

Data Governance

The set of policies, processes, and assigned responsibilities that ensure data is managed consistently, accurately, and in accordance with regulatory requirements across an organisation. Data governance covers data ownership, classification, quality standards, retention schedules, and access control. It is a prerequisite for GDPR compliance, effective AI deployment, and any strategic initiative that depends on reliable, well-understood data. Without it, organisations often discover data quality and access problems only when they try to act on the data.

AI consultancy services →

Need help navigating any of this?

Our team works across all four of these areas. Tell us your situation and we will tell you plainly what you need to do.

Talk to our team