4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need To Be Familiar With Patching Terminology

You Need To Be Familiar With Patching Terminology

Over the past several months, while watching the news or reading about business and technology, you’ve probably encountered a few words, such as ‘ransomware’ ‘exploit weakness’, and ‘security patch’. These terms are used often, and you may be confused as to what they really mean, and how they relate to you and the security of your business’ data.

In recent months, ransomware attacks like WannaCry and other malware have made headlines, with cyber criminals exploiting weaknesses in networks, application deployments, and operating systems. What is very hard for some people to understand is that often the weaknesses being exploited are known by software developers, who have released security updates known as ‘patches.’

For many small business owners and personal PC users, a better understanding of types of patches, how they work, when they’re released, and how to access them might be all that stands between a hacker and your network. Here are five terms that are associated with the continuous software updates that aim to protect users from data loss or worse.

Patch Tuesday - For those who allow their computer to update and install patches automatically, it might have never really occurred to them that there was a schedule as to when Microsoft released patches. Similar to how new movies are released or video games are launched on specific days of the week, Microsoft releases patches on the second (and sometimes fourth) Tuesday of each month. With newer operating systems and software versions, there might come a time where Patch Tuesday becomes obsolete in favor of a real-time data exchange where software and applications are constantly updated as needed.

Security Patching - This is what most people think of when they think of a patch for a piece of software or an application. It’s a series of data and files that fix or mitigate the threat of a known issue or vulnerability. These are generally what are provided on official patch days, like Patch Tuesday. That is, of course, unless the patch is a zero-day or immediate release, an action usually reserved for major security risks or weaknesses found after they have been exploited.

Hotfix - Sometimes referred to as a ‘Quick-fix Update’ ‘Quick-fix Engineering Update’ or ‘General Distribution Release’, a hotfix is a small patch that fixes a single bug or vulnerability that is significant enough that it should not wait until the next scheduled patch release. Although, Microsoft itself no longer uses the term ‘hotfix’ in an official capacity, the term is still widely used by majority of the industry.

Zero Day Vulnerability - This is a specific type of weakness that is not discovered or disclosed until the hackers are already exploiting it. This is called ‘zero day’ because software developers and advocates have no time - or zero days - to create a patch or develop a work around, leaving both users and developers scrambling to keep data safe.

Whitelisting - As related to malware and ransomware, whitelisting is the process in which a patch or application is declared safe, allowed access to the network, or otherwise approved for a certain network or program. The term ‘whitelist’ comes from the opposite of ‘blacklist’. Made popular during the Cold War, blacklist refers to a list of people or items that are banned, rejected, or labeled in a negative way. Whitelisting was tossed around when so many WannaCry victims had the security patch needed since March. Many establishments were waiting for internal IT departments to test and officially ‘whitelist’ the patch which would allow the installation of the security patch needed to eliminate the vulnerability exploited by the WannaCry ransomware.

Truthfully, there is a lot more to patches than just the five terms above - and the more your business relies on technology the more important proper maintenance of technology - including patches and updates, becomes to your continued success. In the end, working with 4IT will help you make sure that your business is always properly updated, with pertinent, whitelisted patches. Call us at 305-278-7100 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 March 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet software Business Computing Business Management Hackers Backup Productivity Hosted Solutions Malware Managed Service Provider Google IT Services Business Efficiency Windows IT Support Disaster Recovery Innovation Hardware Business Continuity VoIP User Tips Workplace Tips Network Security Mobile Devices Saving Money Computer Virtualization Upgrade Mobile Device Management Windows 10 Miscellaneous Data Server Email communications Alert Mobile Computing Small Business Microsoft Office Communication Network Save Money Managed IT Services Outsourced IT Quick Tips Apps Social Media Smartphone Smartphones BYOD Going Green Mobile Office Browser Information Technology Productivity Cybercrime Android Gadgets Office Health Holiday Managed IT Cybersecurity Application Ransomware Operating System Chrome Disaster Best Practice Risk Management Tablet Mobility WiFi Data Backup Firewall The Internet of Things Passwords Avoiding Downtime Remote Computing Internet of Things Unified Threat Management IT Solutions Data Management Spam BDR Data Recovery History Telephone Systems Search Collaboration Automation Facebook Vendor Management Marketing Hacking Hard Drives Phishing Saving Time Remote Monitoring User Error Employer-Employee Relationship Budget Apple Wireless Technology VPN Big Data Content Filtering Law Enforcement Password Proactive IT Office 365 Vulnerability Hosted Solution iPhone Customer Relationship Management Computers Maintenance Recovery Phone System Money Data Security Office Tips Printer Tech Support Antivirus Shortcut USB Social Humor Analytics Work/Life Balance Encryption IT Support Administration Gmail Router Wearable Technology Social Engineering Government App PowerPoint Telephony Intranet Virus Lithium-ion battery OneNote Current Events Two-factor Authentication Google Drive Bring Your Own Device Audit HaaS Identity Theft Data Protection Point of Sale Flexibility IT COnsultant Business Intelligence Outlook Computer Repair Retail Windows 10 Cost Management Politics Personal Information Bandwidth Private Cloud Printer Server Users Laptop Windows 8 Wireless Unsupported Software Cloud Computing Education Trending Data Breach Net Neutrality SaaS Excel Save Time Network Congestion Cortana Augmented Reality Solid State Drive Help Desk Travel Paperless Office Sports Project Management Customer Service Fax Server Update Biometrics Workplace Virtual Reality Blockchain Samsung Networking Streaming Media Wi-Fi Commerce Artificial Intelligence Meetings Emergency Uninterrupted Power Supply Applications online currency Instant Messaging Emails Data Loss Social Networking hacker HIPAA Managed IT Services Entertainment Google Docs Transportation Benefits Redundancy Data Storage DDoS Computer Accessories Computer Care Battery Robot Efficency Compliance Mouse Automobile End of Support eWaste Managing Stress Legal Internet Exlporer Display User Wireless Charging Managed Security Amazon HBO Scam NFL Co-managed IT best practices Science Ciminal Virtual Desktop Presentation CrashOverride Bluetooth Best Available WannaCry IT Management Employer Employee Relationship Word data breach Lifestyle IT Technicians Legislation Worker Commute Ebay Settings Operating Sysytem PDF Nokia SharePoint Evernote Computing WIndows Server 2008 MSP Windows Ink Scalability risk management Files IT Budget Comparison Patch Management Text Messaging Teamwork Workers Safety Busines Continuity Google Maps How To Chromecast Upgrades Near Field Communication Specifications Regulation Updates Identities Training Software as a Service Administrator Twitter Human Resources Consultant IT consulting Conferencing Colocation Sync Running Cable Microsoft Word The Blindside Of IoT Company Culture Black Market iOS Access Surge Protector Television Touchscreen Hard Drive Reliable Computing Gifts Managed IT Service 3D Printing Adobe Device Security IT Security Bloatware Cleaning Computer Fan Uograde Images Experience Licensing Avoid Downtime Devices Keyboard Sales ISP Microsoft Excel Dark Web Branding Credit Cards Music Screen Mirroring Distributed Denial of Service Spyware Hiring/Firing Programming File Sharing Blogging Data storage WIndows 7 FAQ Books Cast Inbound Marketing Video Games Windows 10s Storage Fraud Smart Technology Wiring Regulations systems Document Management Website Nanotechnology Information Charger Advertising Value Tablets Hard Disk Drive Edge Debate Mobile Device OneDrive Cameras hack Root Cause Analysis Touchpad Domains Taxes Supercomputer Electronic Medical Records Buisness Reputation Tutorial Microblogging Language Youtube Shadow IT Relocation Webinar Tech Term Gift Giving Managed Service Provder Mobile IT solutions Webinar Proactive Professional Services Websites IT service