Definitions

AIArtificial Intelligence
BYODBring your own device
ComputerDesktop Computer, Laptop, Tablets, Smart Phones, Cellphones
CSPThe Microsoft Cloud Solution Provider Program (CSP) enables partners to directly manage their entire Microsoft cloud customer lifecycle. Partners in this program utilize dedicated in-product tools to directly provision, manage, and support their customer subscriptions.
GDPRGeneral Data Protection Regulation
ICTInformation and Communications Technology
IoTInternet of Things
Managed ServicesManaged services are the practice of outsourcing the responsibility for maintaining, and anticipating need for, a range of processes and functions to improve operations and cut expenses.
MemoryMemory is the electronic holding place for the instructions and data a computer needs, to reach quickly. It’s where information is stored for immediate use. Memory is also used by a computer’s operating system, hardware, and software.
MSPManaged Service Providers (MSPs) are the pros you hire to keep your devices up to date, to help your employees when they get into an IT rut, to secure your network, and to give you advice when technology simply isn’t working as you’d expect.
MSSPA managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems. Common services include managed firewall, intrusion detection, virtual private network, vulnerability scanning and anti-viral services. MSSPs use high-availability security operation centers (either from their own facilities or from other data center providers) to provide 24/7 services designed to reduce the number of operational security personnel an enterprise needs to hire, train and retain to maintain an acceptable security posture. The Sole Proprietor and / or SME’s can seldom afford an internal security specialist.  MSSP are very beneficial in these circumstances.  They can help the Sole Proprietor / SME to achieve acceptable security posture without big capital layouts.
OSAn OS handles the behind-the-scenes activities of a computer, such as orchestrating the transitions from one program to another and managing access to disk storage and peripheral devices. 
POPIAProtection of Personal Information Act
RAMRAM stands for random-access memory.  Your computer RAM is essentially short-term memory where data is stored as the processor needs it. This is not to be confused with long-term data that’s stored on your hard drive, which stays there even when your computer is turned off.
ROIReturn on Investment
SaaSSoftware as a Service  
SIEMSecurity Information and Event Monitoring
SOCSecurity Operations Center
SOCaaPComodo’s SOC as a platform