4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need To Be Familiar With Patching Terminology

You Need To Be Familiar With Patching Terminology

Over the past several months, while watching the news or reading about business and technology, you’ve probably encountered a few words, such as ‘ransomware’ ‘exploit weakness’, and ‘security patch’. These terms are used often, and you may be confused as to what they really mean, and how they relate to you and the security of your business’ data.

In recent months, ransomware attacks like WannaCry and other malware have made headlines, with cyber criminals exploiting weaknesses in networks, application deployments, and operating systems. What is very hard for some people to understand is that often the weaknesses being exploited are known by software developers, who have released security updates known as ‘patches.’

For many small business owners and personal PC users, a better understanding of types of patches, how they work, when they’re released, and how to access them might be all that stands between a hacker and your network. Here are five terms that are associated with the continuous software updates that aim to protect users from data loss or worse.

Patch Tuesday - For those who allow their computer to update and install patches automatically, it might have never really occurred to them that there was a schedule as to when Microsoft released patches. Similar to how new movies are released or video games are launched on specific days of the week, Microsoft releases patches on the second (and sometimes fourth) Tuesday of each month. With newer operating systems and software versions, there might come a time where Patch Tuesday becomes obsolete in favor of a real-time data exchange where software and applications are constantly updated as needed.

Security Patching - This is what most people think of when they think of a patch for a piece of software or an application. It’s a series of data and files that fix or mitigate the threat of a known issue or vulnerability. These are generally what are provided on official patch days, like Patch Tuesday. That is, of course, unless the patch is a zero-day or immediate release, an action usually reserved for major security risks or weaknesses found after they have been exploited.

Hotfix - Sometimes referred to as a ‘Quick-fix Update’ ‘Quick-fix Engineering Update’ or ‘General Distribution Release’, a hotfix is a small patch that fixes a single bug or vulnerability that is significant enough that it should not wait until the next scheduled patch release. Although, Microsoft itself no longer uses the term ‘hotfix’ in an official capacity, the term is still widely used by majority of the industry.

Zero Day Vulnerability - This is a specific type of weakness that is not discovered or disclosed until the hackers are already exploiting it. This is called ‘zero day’ because software developers and advocates have no time - or zero days - to create a patch or develop a work around, leaving both users and developers scrambling to keep data safe.

Whitelisting - As related to malware and ransomware, whitelisting is the process in which a patch or application is declared safe, allowed access to the network, or otherwise approved for a certain network or program. The term ‘whitelist’ comes from the opposite of ‘blacklist’. Made popular during the Cold War, blacklist refers to a list of people or items that are banned, rejected, or labeled in a negative way. Whitelisting was tossed around when so many WannaCry victims had the security patch needed since March. Many establishments were waiting for internal IT departments to test and officially ‘whitelist’ the patch which would allow the installation of the security patch needed to eliminate the vulnerability exploited by the WannaCry ransomware.

Truthfully, there is a lot more to patches than just the five terms above - and the more your business relies on technology the more important proper maintenance of technology - including patches and updates, becomes to your continued success. In the end, working with 4IT will help you make sure that your business is always properly updated, with pertinent, whitelisted patches. Call us at 305-278-7100 to learn more.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 15 December 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Hackers Backup Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows Disaster Recovery IT Support Innovation Business Continuity Hardware VoIP Workplace Tips User Tips Saving Money Computer Virtualization Upgrade Windows 10 Miscellaneous Mobile Device Management Mobile Devices Data Server Network Security Mobile Computing Email Alert Save Money Communication Microsoft Office Network Quick Tips communications Small Business Smartphone BYOD Information Technology Going Green Mobile Office Social Media Smartphones Health Android Apps Office Managed IT Services Operating System Outsourced IT Application Chrome Ransomware Browser Gadgets Productivity Managed IT Disaster Holiday Firewall Avoiding Downtime Tablet Mobility WiFi Data Management Search Cybercrime The Internet of Things Cybersecurity Risk Management Telephone Systems Remote Computing Unified Threat Management IT Solutions Spam BDR Best Practice Passwords Vendor Management VPN Employer-Employee Relationship Facebook Budget History Remote Monitoring Automation Hard Drives Saving Time Apple Hacking Data Backup Marketing Collaboration Phishing Password Hosted Solution Wireless Technology Computers Law Enforcement iPhone Phone System Customer Relationship Management Big Data Recovery Content Filtering Data Recovery Proactive IT Office Tips Money User Error Bring Your Own Device Lithium-ion battery Social Current Events Humor Telephony Administration Work/Life Balance Wearable Technology Printer Maintenance Office 365 PowerPoint USB Virus Vulnerability Analytics Encryption Gmail Router Government Antivirus Shortcut Cloud Computing Google Drive Bandwidth Printer Server Save Time Laptop Data Security OneNote Social Engineering Point of Sale Data Protection IT COnsultant Education Trending Computer Repair Net Neutrality Private Cloud Tech Support Outlook Politics Personal Information Users SaaS Windows 8 Audit HaaS App Wireless Unsupported Software Cost Management Business Intelligence Intranet Update Customer Service Network Congestion Biometrics Internet Exlporer Retail Virtual Reality Help Desk Internet of Things Efficency Meetings Identity Theft Solid State Drive Flexibility Sports Emails Instant Messaging HIPAA Entertainment Display Benefits Samsung DDoS Computer Accessories Wi-Fi Emergency IT Support Artificial Intelligence Augmented Reality Paperless Office Mouse Social Networking Compliance Applications Windows 10 hacker Fax Server Two-factor Authentication Managing Stress Transportation Workplace Excel Streaming Media Computer Care Battery Robot Uninterrupted Power Supply Data Storage online currency Automobile End of Support Travel 3D Printing SharePoint Document Management Advertising Debate File Sharing Data Breach Cast Legal Teamwork Mobile Device Windows 10s Touchpad Busines Continuity Managed Security Nanotechnology ISP systems Networking Near Field Communication Scam Tablets Hard Disk Drive Root Cause Analysis Programming Blogging hack Human Resources Nokia IT consulting Employer Employee Relationship HBO Operating Sysytem Running Cable NFL Worker Commute best practices CrashOverride PDF Website Cortana Reliable Computing IT Management Scalability Files Word data breach Safety Settings Text Messaging OneDrive Bloatware Legislation WIndows Server 2008 How To Chromecast Amazon Co-managed IT Upgrades Windows Ink risk management Branding Training Patch Management Administrator Colocation Distributed Denial of Service Lifestyle Consultant Google Maps The Blindside Of Hard Drive Commerce Ebay WIndows 7 Company Culture Regulation Black Market Access Computing eWaste Storage Touchscreen Software as a Service Inbound Marketing Regulations IT Security Images Uograde Cleaning Sync Data Loss Value Experience iOS Cameras Keyboard Managed IT Service Avoid Downtime User Adobe Managed IT Services Science Google Docs Music Computer Fan Presentation Hiring/Firing Virtual Desktop Twitter Bluetooth Best Available Licensing Data storage IT Technicians Surge Protector Microsoft Excel Books Wiring Dark Web Smart Technology Screen Mirroring Video Games Television Information Mobile IT solutions Buisness FAQ Professional Services Gift Giving Taxes Supercomputer Electronic Medical Records IT Budget Reputation Comparison Specifications Microblogging Youtube Conferencing IT service Shadow IT Relocation Sales Tutorial Gifts Domains Managed Service Provder Webinar Redundancy Webinar Credit Cards