513 Results for:shoretel loss

  • Sort by: 

digital innovation

Digital innovation is the adoption of modern digital technologies by a business. Read Full Definition

Associated Glossaries

multisig (multisignature)

Multisig, also called multisignature, is the requirement for a transaction to have two or more signatures before it can be executed. Read Full Definition

hardware RAID (hardware redundant array of independent disk)

Hardware RAID is a form of RAID (redundant array of independent disks) where processing is done on the motherboard or a separate RAID card. Read Full Definition

Associated Glossaries

records management

Records management is the supervision and administration of digital or paper records, regardless of format. Read Full Definition

Associated Glossaries

cyber resilience

Cyber resilience is the ability of a computing system to identify, respond and recover quickly should it experience a security incident. Read Full Definition

retina scan

Retina scanning is a biometric authentication technology that uses an image of an individual's retinal blood vessel pattern as a unique identifying trait for access to secure installations. Read Full Definition

point of care (POC) testing

Point of care testing (POC testing or POCT) is medical testing performed with the patient, outside of a laboratory setting. POC testing is also known as bedside testing, near-patient testing, remote testing, mobile... Read Full Definition

double extortion ransomware

Double extortion ransomware is a novel form of malware that combines ransomware with elements of extortionware to maximize the victim's potential payout. Read Full Definition

Associated Glossaries

COPE (corporate-owned, personally enabled)

COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned ... Read Full Definition

cyberterrorism

Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and data that threatens violence or results in violence. Read Full Definition