(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Terms That Every User Needs To Know

Chances are that you’ve seen quite a lot of stories on the Internet, or in the news, about the many security threats out there. Some of these, including ransomware, exploits, and reluctance to update software, might fly over your head if they’re not part of your everyday business vocabulary. Knowing what these terms mean is of the utmost importance in today’s workplace. We’re here to help you understand what some of these security terms mean for your organization.

Ransomware like WannaCry are one of the primary reasons why it’s so important to understand how network security works, and all of the terminology behind it. After all, hackers understand how to exploit your network’s weaknesses, so you’ll want to know all about the primary way to protect your business’s data from them: security patches.

These patches are issued by software developers to resolve certain issues or troubles found in their products. For example, a patch might be designed to address a recently found vulnerability in the program’s code, or resolve a particularly troublesome issue with the user interface. Understanding how these patches work is critical if you want to ensure the security of your business, your personal computer, and everything in between. Here are five of the most common terms used when speaking of security patches.

Patch Tuesday
Even if you allow your computers to update and install patches automatically, you should still have an idea when these patches are installed. Microsoft has a set schedule that they use to release these patches. They are released on specific days of the week, including the second Tuesday of each month, and sometimes the fourth as well. Perhaps in the future, data exchange will allow newer operating systems to be updated more frequently, or at the very least in real time, keeping your systems more secure.

Security Patching
Patches are basically issued to fix something that’s wrong with a computer application or program. It is these patches and updates that are provided on all of the official patch days, like Patch Tuesday. Of course, immediate patches to imminent threats of Microsoft’s software are issued for release as soon as one is created. These zero-day threats are so dangerous that they need to be resolved as soon as possible, making them top-priority for your organization.

These are sometimes called quick fix updates, quick-fix engineering updates, and general distribution releases. These hotfixes generally include a patch that fixes just one small thing wrong with your application. These small issues are usually important enough that they need to be issued immediately without waiting for the next batch of patches. Even though Microsoft has long since forsaken the term “hotfix” specifically, it’s still used as a common way to refer to these fixes in the technology sector.

Zero-Day Threats
These types of weaknesses are those that are being used by hackers even before they are discovered by security professionals. The name “zero-day” refers to the fact that the software developers have no time, or zero days, to develop a patch to resolve the issue. These are some of the most dangerous threats out there, and need to be a priority for companies trying to keep damage to a minimum.

Whitelisting is the process through which a patch or application is deemed secure or safe for your business. This allows your whitelisted app to access information found on your network. Contrary to whitelisting, blacklisting is the process of banning network access to certain apps. Whitelisting was a popular term used to discuss the security patch resolving the issue with the WannaCry ransomware, as IT departments wanted the patch to be “whitelisted” first to guarantee that the patch would be enough to stop it.

Is your business security-savvy enough to identify major problems with your network infrastructure? To learn more about how you can protect your business, reach out to us at (703) 288-9767.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Best Practices Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Efficiency Mobile Devices IT Support Business VoIP Miscellaneous IT Services Managed Service Provider Server Business Continuity Workplace Tips Disaster Recovery Network Innovation Data Upgrade Software Hardware Email Communication Computer Windows Save Money Saving Money Business Management Mobile Device Management Microsoft Office Virtualization Browser Smartphones Network Security User Tips Windows 10 WiFi Managed IT Services Smartphone Holiday Android BYOD Social Media communications Operating System Mobile Computing Hacking Small Business Apple Proactive IT Remote Monitoring Avoiding Downtime Computers Cybercrime IT Solutions Chrome Outsourced IT Application Automation Information Technology Passwords Office Marketing Budget Collaboration Ransomware Data Backup The Internet of Things Big Data Alert Quick Tips spam Employer-Employee Relationship Managed IT Services Going Green Mobility Remote Computing Health Bring Your Own Device VPN Recovery Social Engineering iPhone Save Time Firewall Gadgets Managed IT Wireless Technology User Error Cybersecurity Telephone Systems App Vendor Management Antivirus Downtime Private Cloud History Tablet Mouse Analytics Router Retail Memory Redundancy Search Bandwidth Office 365 Compliance IT Support Networking Office Tips PowerPoint Website Gmail Lithium-ion battery Excel Phone System Content Filtering Google Drive Public Cloud Environment Vulnerability Administration Data Security Current Events Phishing How To SaaS Entertainment Running Cable Maintenance Safety Value Skype Government Unified Threat Management Meetings Mobile Office HaaS Customer Relationship Management Fax Server Cloud Computing Black Market Law Enforcement Intranet Best Available Data Management Solid State Drive Two-factor Authentication Data Storage People Internet of Things Artificial Intelligence Programming Word Network Congestion Trending Internet Exlporer Data storage Windows 10 Biometrics Business Owner Apps IT Consultant Humor Statistics Hard Drives Saving Time Data Recovery Facebook Document Management Risk Management Outlook Online Currency Unsupported Software Physical Security DDoS Money Printer BDR Flexibility Robot Settings Software Tips Laptop Scam Distributed Denial of Service Telephony Windows Media Player Print Server Google Docs Virtual Desktop Touchpad IT service Human Resources Relocation Hybrid Cloud Start Menu Virtual Reality Hiring/Firing Training Audit Computer Care Uninterrupted Power Supply Voice over Internet Protocol WIndows 7 HIPAA Domains HBO Net Neutrality Computer Repair Spam Blocking IaaS Mobile Bloatware Customer Service Screen Mirroring Cleaning Multi-Factor Security Managing Stress Frequently Asked Questions LinkedIn Professional Services Virus Entrepreneur Cast Tech Support Lifestyle Tip of the week Hacker Touchscreen Debate Computer Fan Tools Computer Accessories Cost Management Shadow IT Applications Data Protection Wireless Files Windows Server 2008 Science FENG Video Surveillance Productivity Streaming Media Cameras Instant Messaging Consultant Shortcut Business Intelligence Wi-Fi SharePoint Colocation Windows 7 Windows 8 Education Workers Encryption Botnet Printer Server Data Warehousing Bluetooth Sports Monitor Hosted Solution eWaste Computing Infrastructure Regulations Worker Commute Tablets Piracy OneNote Notifications Travel User IT Management USB YouTube Reputation Wearable Technology End of Support Servers Licensing Samsung Social IT Plan Twitter Company Culture NarrowBand Work/Life Balance Customers Internet exploMicrosoft Flash Windows 8.1 Update Root Cause Analysis Crowdfunding Best Practice Software as a Service Social Networking Chromecast Patch Management Advertising Sync Analyitcs Data loss Update Audiobook Knowledge Netflix Charger Scalability Politics Transportation How to Users webinar Benefits PDF Loyalty Keyboard Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Password Television Comparison Troubleshooting Electronic Medical Records Techology Public Computer Specifications Employer Employee Relationship Legal Data Breach Automobile Books Emails CrashOverride Mobile Device IBM Emergency Webinar Worker Supercomputer Content IT solutions Rootkit Video Games