(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Terms That Every User Needs To Know

Security Terms That Every User Needs To Know

Chances are that you’ve seen quite a lot of stories on the Internet, or in the news, about the many security threats out there. Some of these, including ransomware, exploits, and reluctance to update software, might fly over your head if they’re not part of your everyday business vocabulary. Knowing what these terms mean is of the utmost importance in today’s workplace. We’re here to help you understand what some of these security terms mean for your organization.

Ransomware like WannaCry are one of the primary reasons why it’s so important to understand how network security works, and all of the terminology behind it. After all, hackers understand how to exploit your network’s weaknesses, so you’ll want to know all about the primary way to protect your business’s data from them: security patches.

These patches are issued by software developers to resolve certain issues or troubles found in their products. For example, a patch might be designed to address a recently found vulnerability in the program’s code, or resolve a particularly troublesome issue with the user interface. Understanding how these patches work is critical if you want to ensure the security of your business, your personal computer, and everything in between. Here are five of the most common terms used when speaking of security patches.

Patch Tuesday
Even if you allow your computers to update and install patches automatically, you should still have an idea when these patches are installed. Microsoft has a set schedule that they use to release these patches. They are released on specific days of the week, including the second Tuesday of each month, and sometimes the fourth as well. Perhaps in the future, data exchange will allow newer operating systems to be updated more frequently, or at the very least in real time, keeping your systems more secure.

Security Patching
Patches are basically issued to fix something that’s wrong with a computer application or program. It is these patches and updates that are provided on all of the official patch days, like Patch Tuesday. Of course, immediate patches to imminent threats of Microsoft’s software are issued for release as soon as one is created. These zero-day threats are so dangerous that they need to be resolved as soon as possible, making them top-priority for your organization.

These are sometimes called quick fix updates, quick-fix engineering updates, and general distribution releases. These hotfixes generally include a patch that fixes just one small thing wrong with your application. These small issues are usually important enough that they need to be issued immediately without waiting for the next batch of patches. Even though Microsoft has long since forsaken the term “hotfix” specifically, it’s still used as a common way to refer to these fixes in the technology sector.

Zero-Day Threats
These types of weaknesses are those that are being used by hackers even before they are discovered by security professionals. The name “zero-day” refers to the fact that the software developers have no time, or zero days, to develop a patch to resolve the issue. These are some of the most dangerous threats out there, and need to be a priority for companies trying to keep damage to a minimum.

Whitelisting is the process through which a patch or application is deemed secure or safe for your business. This allows your whitelisted app to access information found on your network. Contrary to whitelisting, blacklisting is the process of banning network access to certain apps. Whitelisting was a popular term used to discuss the security patch resolving the issue with the WannaCry ransomware, as IT departments wanted the patch to be “whitelisted” first to guarantee that the patch would be enough to stop it.

Is your business security-savvy enough to identify major problems with your network infrastructure? To learn more about how you can protect your business, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Microsoft Productivity Backup Malware Hosted Solutions Internet Mobile Devices Google Efficiency Business IT Support VoIP IT Services Managed Service Provider Email Miscellaneous Server Business Continuity Workplace Tips Disaster Recovery Data Windows Innovation Upgrade Network Software Hardware Business Management Save Money Saving Money Communication Computer Network Security Smartphones Android Mobile Device Management Browser Smartphone Managed IT Services Holiday communications Microsoft Office User Tips Virtualization Outsourced IT WiFi Windows 10 Operating System Mobile Computing Computers Hacking BYOD Small Business Data Backup Chrome Social Media IT Solutions Alert Cybercrime Apple Application Proactive IT Remote Monitoring Avoiding Downtime Passwords Employer-Employee Relationship Marketing Office The Internet of Things Budget Collaboration Managed IT Services Quick Tips Big Data Ransomware Information Technology Social Engineering Automation Going Green Remote Computing Mobility Health Bring Your Own Device VPN Gadgets spam Recovery Data Recovery Telephone Systems How To BDR Bandwidth Managed IT Compliance Cloud Computing Wireless Technology User Error Vendor Management Two-factor Authentication iPhone Cybersecurity Save Time Firewall App Value Gmail Lithium-ion battery Artificial Intelligence Retail Memory Search Vulnerability Private Cloud Networking IT Support Mouse Risk Management Redundancy Office 365 Windows 10 Antivirus Internet of Things PowerPoint Website Excel Phone System Content Filtering Router Money Analytics Downtime Office Tips History Tablet Skype Phishing Unified Threat Management Unsupported Software Physical Security DDoS Mobile Office Robot Customer Relationship Management Google Drive Environment Best Available Apps Identity Theft IT Consultant Data Security SaaS People Programming Law Enforcement Credit Cards Safety Network Congestion Saving Time Government Trending Solid State Drive Document Management Meetings Online Currency HaaS Fax Server Black Market Workers Humor Printer Data Management Statistics Business Owner Data Storage Word OneNote Current Events Business Intelligence Internet Exlporer Data storage Outlook Maintenance Biometrics Work/Life Balance Flexibility IT Management Administration Hard Drives Facebook Entertainment Intranet Running Cable Public Cloud Software as a Service Best Practice Social Networking Charger Telecommuting Chromecast Sync Analyitcs Hybrid Cloud Cables Managing Stress Update Computer Care Settings LinkedIn HIPAA Remote Work Virus Software Tips Laptop Telephony Distributed Denial of Service Spam Blocking Unified Communications Google Docs Debate Virtual Desktop IT service Human Resources Keyboard Computer Accessories Touchpad Start Menu Relocation Virtual Reality Theft Voice over Internet Protocol Audit Uninterrupted Power Supply Training Domains Video Surveillance Cameras HBO Consultant Mobile IaaS Computer Fan Bloatware Cortana Applications Company Culture Multi-Factor Security Screen Mirroring Cleaning Education Customer Service Files Fraud Printer Server Windows 8.1 Update Frequently Asked Questions Password Google Apps Professional Services FENG Entrepreneur Productivity Wi-Fi Lifestyle Worker Commute Cast Tech Support Piracy Tip of the week Hacker Colocation Amazon Infrastructure User Tools Cost Management Data Protection Shadow IT Licensing Windows Server 2008 Wireless Samsung Science Hosted Solution Computing Infrastructure Amazon Web Services Password Manager Twitter Print Server Streaming Media Instant Messaging Shortcut Comparison Windows 7 SharePoint Crowdfunding Windows 8 End of Support Online Shopping Mobile Device Botnet Encryption Bluetooth Net Neutrality Specifications Computer Repair Data Warehousing Sports Regulations Monitor eWaste Tablets Internet exploMicrosoft Evernote Travel Notifications Root Cause Analysis USB Millennials Windows Media Player YouTube Servers Reputation Wearable Technology Patch Management Advertising Wireless Charging Data loss Social Touchscreen Workforce IT Plan NarrowBand Hiring/Firing Flash Customers Scam Fiber-Optic WIndows 7 Scalability Politics Transportation How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Electronic Medical Records Public Computer Legal Employer Employee Relationship Data Breach Automobile Emails Books Business Mangement CrashOverride IBM Users Webinar Emergency Recycling Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix