(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Terms That Every User Needs To Know

Chances are that you’ve seen quite a lot of stories on the Internet, or in the news, about the many security threats out there. Some of these, including ransomware, exploits, and reluctance to update software, might fly over your head if they’re not part of your everyday business vocabulary. Knowing what these terms mean is of the utmost importance in today’s workplace. We’re here to help you understand what some of these security terms mean for your organization.

Ransomware like WannaCry are one of the primary reasons why it’s so important to understand how network security works, and all of the terminology behind it. After all, hackers understand how to exploit your network’s weaknesses, so you’ll want to know all about the primary way to protect your business’s data from them: security patches.

These patches are issued by software developers to resolve certain issues or troubles found in their products. For example, a patch might be designed to address a recently found vulnerability in the program’s code, or resolve a particularly troublesome issue with the user interface. Understanding how these patches work is critical if you want to ensure the security of your business, your personal computer, and everything in between. Here are five of the most common terms used when speaking of security patches.

Patch Tuesday
Even if you allow your computers to update and install patches automatically, you should still have an idea when these patches are installed. Microsoft has a set schedule that they use to release these patches. They are released on specific days of the week, including the second Tuesday of each month, and sometimes the fourth as well. Perhaps in the future, data exchange will allow newer operating systems to be updated more frequently, or at the very least in real time, keeping your systems more secure.

Security Patching
Patches are basically issued to fix something that’s wrong with a computer application or program. It is these patches and updates that are provided on all of the official patch days, like Patch Tuesday. Of course, immediate patches to imminent threats of Microsoft’s software are issued for release as soon as one is created. These zero-day threats are so dangerous that they need to be resolved as soon as possible, making them top-priority for your organization.

These are sometimes called quick fix updates, quick-fix engineering updates, and general distribution releases. These hotfixes generally include a patch that fixes just one small thing wrong with your application. These small issues are usually important enough that they need to be issued immediately without waiting for the next batch of patches. Even though Microsoft has long since forsaken the term “hotfix” specifically, it’s still used as a common way to refer to these fixes in the technology sector.

Zero-Day Threats
These types of weaknesses are those that are being used by hackers even before they are discovered by security professionals. The name “zero-day” refers to the fact that the software developers have no time, or zero days, to develop a patch to resolve the issue. These are some of the most dangerous threats out there, and need to be a priority for companies trying to keep damage to a minimum.

Whitelisting is the process through which a patch or application is deemed secure or safe for your business. This allows your whitelisted app to access information found on your network. Contrary to whitelisting, blacklisting is the process of banning network access to certain apps. Whitelisting was a popular term used to discuss the security patch resolving the issue with the WannaCry ransomware, as IT departments wanted the patch to be “whitelisted” first to guarantee that the patch would be enough to stop it.

Is your business security-savvy enough to identify major problems with your network infrastructure? To learn more about how you can protect your business, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 21 September 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Productivity Business Computing Microsoft Backup Malware Hosted Solutions Internet Efficiency Mobile Devices IT Support Google Business IT Services Managed Service Provider Miscellaneous Server Workplace Tips VoIP Business Continuity Data Innovation Network Disaster Recovery Upgrade Hardware Email Windows Save Money Saving Money Business Management Computer Software Mobile Device Management Communication Virtualization Smartphones Smartphone Browser Network Security Microsoft Office User Tips Windows 10 Holiday BYOD Hacking Android Social Media WiFi Operating System communications Mobile Computing IT Solutions Managed IT Services Computers Cybercrime Apple Chrome Application Automation Marketing The Internet of Things Office Budget Quick Tips Small Business Big Data Proactive IT Information Technology Outsourced IT Passwords Going Green Remote Computing Collaboration Health Alert Managed IT Services VPN Employer-Employee Relationship spam Remote Monitoring Avoiding Downtime Managed IT Ransomware Recovery Vendor Management Wireless Technology User Error Mobility Social Engineering Bring Your Own Device iPhone App Gadgets Save Time Firewall Tablet Memory Office 365 Retail Search Bandwidth Compliance Networking IT Support Antivirus Telephone Systems Gmail Lithium-ion battery Data Backup PowerPoint Excel Analytics Phone System Private Cloud Downtime Mouse History Data Storage Entertainment Running Cable Redundancy Meetings Value HaaS Fax Server Unified Threat Management Public Cloud Skype Black Market Mobile Office Data Management How To Customer Relationship Management Internet of Things IT Consultant Internet Exlporer Best Available People Data storage Biometrics Programming Saving Time Document Management Network Congestion Risk Management Cloud Computing Online Currency Law Enforcement Unsupported Software Office Tips Solid State Drive Hard Drives Printer Facebook Humor Statistics Windows 10 Current Events Business Owner Physical Security DDoS Robot BDR Maintenance Website Outlook Google Drive Router Environment Flexibility Cybersecurity Content Filtering Safety Intranet Administration Customer Service Patch Management Hiring/Firing Advertising Cleaning Windows Server 2008 Data loss WIndows 7 Artificial Intelligence Word Entrepreneur Business Intelligence Tech Support Windows 7 Hacker Managing Stress Phishing Botnet Cost Management Data Warehousing Two-factor Authentication Virus Hybrid Cloud LinkedIn Shadow IT Apps Regulations Wireless Science HIPAA Debate Travel Streaming Media Instant Messaging IT Management Shortcut Spam Blocking Computer Accessories Servers SharePoint Windows 8 Encryption Sports IT Plan Bluetooth Cameras Company Culture Video Surveillance Trending Monitor Windows 8.1 Update Flash eWaste Tablets Consultant Education Notifications YouTube Computer Fan USB Printer Server Applications Reputation Sync Wearable Technology Social Worker Commute Piracy Files NarrowBand Software Tips FENG Customers Telephony User Vulnerability Social Networking Workers Licensing Colocation Best Practice Print Server Samsung Chromecast Data Security Twitter Start Menu Analyitcs Audit Hosted Solution Computing Infrastructure Crowdfunding Laptop Computer Repair HBO Settings OneNote Net Neutrality Mobile Distributed Denial of Service Screen Mirroring Virtual Desktop End of Support Money Touchpad Frequently Asked Questions IT service Human Resources Relocation Professional Services SaaS Virtual Reality Cast Training Windows Media Player Internet exploMicrosoft Uninterrupted Power Supply Tip of the week Domains Root Cause Analysis Touchscreen Government Tools IaaS Bloatware IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scam Scalability Charger Politics Transportation How to Computer Care webinar Benefits PDF Loyalty Conferencing Keyboard Data Recovery Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Productivity Password Wi-Fi Television Troubleshooting Electronic Medical Records Techology Public Computer Users Employer Employee Relationship Legal Data Breach Automobile Emails Books Mobile Device CrashOverride IBM Work/Life Balance Webinar Emergency Worker Supercomputer Content