Is cybersecurity jargon getting in the way of deciding which tools and policies are right for your organization?
Whether you have a small team of IT experts or none, this glossary will help you make sense of key terminology.
In this e-book, you’ll discover the meaning of terminology related to:
![icon-laptop-check.png](https://go.dashlane.com/rs/403-EXY-689/images/icon-laptop-check.png)
Information technology (IT)
![PICTO-Passwords.png](https://go.dashlane.com/rs/403-EXY-689/images/PICTO-Passwords.png)
Cybersecurity
![PICTO-Inbox Scan.png](https://go.dashlane.com/rs/403-EXY-689/images/PICTO-Inbox Scan.png)
Cyber threats
![PICTO-Biometrics.png](https://go.dashlane.com/rs/403-EXY-689/images/PICTO-Biometrics.png)
Identity and Access Management (IAM)
![PICTO-Password Generator.png](https://go.dashlane.com/rs/403-EXY-689/images/PICTO-Password Generator.png)
Password management
Learn about fundamental cybersecurity terminology to cut through the jargon and make the best decisions for your organization.