4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need To Be Familiar With Patching Terminology

You Need To Be Familiar With Patching Terminology

Over the past several months, while watching the news or reading about business and technology, you’ve probably encountered a few words, such as ‘ransomware’ ‘exploit weakness’, and ‘security patch’. These terms are used often, and you may be confused as to what they really mean, and how they relate to you and the security of your business’ data.

In recent months, ransomware attacks like WannaCry and other malware have made headlines, with cyber criminals exploiting weaknesses in networks, application deployments, and operating systems. What is very hard for some people to understand is that often the weaknesses being exploited are known by software developers, who have released security updates known as ‘patches.’

For many small business owners and personal PC users, a better understanding of types of patches, how they work, when they’re released, and how to access them might be all that stands between a hacker and your network. Here are five terms that are associated with the continuous software updates that aim to protect users from data loss or worse.

Patch Tuesday - For those who allow their computer to update and install patches automatically, it might have never really occurred to them that there was a schedule as to when Microsoft released patches. Similar to how new movies are released or video games are launched on specific days of the week, Microsoft releases patches on the second (and sometimes fourth) Tuesday of each month. With newer operating systems and software versions, there might come a time where Patch Tuesday becomes obsolete in favor of a real-time data exchange where software and applications are constantly updated as needed.

Security Patching - This is what most people think of when they think of a patch for a piece of software or an application. It’s a series of data and files that fix or mitigate the threat of a known issue or vulnerability. These are generally what are provided on official patch days, like Patch Tuesday. That is, of course, unless the patch is a zero-day or immediate release, an action usually reserved for major security risks or weaknesses found after they have been exploited.

Hotfix - Sometimes referred to as a ‘Quick-fix Update’ ‘Quick-fix Engineering Update’ or ‘General Distribution Release’, a hotfix is a small patch that fixes a single bug or vulnerability that is significant enough that it should not wait until the next scheduled patch release. Although, Microsoft itself no longer uses the term ‘hotfix’ in an official capacity, the term is still widely used by majority of the industry.

Zero Day Vulnerability - This is a specific type of weakness that is not discovered or disclosed until the hackers are already exploiting it. This is called ‘zero day’ because software developers and advocates have no time - or zero days - to create a patch or develop a work around, leaving both users and developers scrambling to keep data safe.

Whitelisting - As related to malware and ransomware, whitelisting is the process in which a patch or application is declared safe, allowed access to the network, or otherwise approved for a certain network or program. The term ‘whitelist’ comes from the opposite of ‘blacklist’. Made popular during the Cold War, blacklist refers to a list of people or items that are banned, rejected, or labeled in a negative way. Whitelisting was tossed around when so many WannaCry victims had the security patch needed since March. Many establishments were waiting for internal IT departments to test and officially ‘whitelist’ the patch which would allow the installation of the security patch needed to eliminate the vulnerability exploited by the WannaCry ransomware.

Truthfully, there is a lot more to patches than just the five terms above - and the more your business relies on technology the more important proper maintenance of technology - including patches and updates, becomes to your continued success. In the end, working with 4IT will help you make sure that your business is always properly updated, with pertinent, whitelisted patches. Call us at 305-278-7100 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 20 October 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft Internet Business Computing software Backup Hackers Hosted Solutions Productivity Business Management Managed Service Provider Malware Google IT Services Business Efficiency Windows Innovation Disaster Recovery IT Support Hardware Workplace Tips Business Continuity Computer VoIP Saving Money Windows 10 Miscellaneous Virtualization User Tips Upgrade Mobile Device Management Mobile Devices Data Network Security Server Mobile Computing Email Network Alert Save Money Microsoft Office Communication Quick Tips communications Social Media Smartphone Smartphones Information Technology BYOD Going Green Mobile Office Apps Small Business Office Health Android Application Browser Ransomware Gadgets Outsourced IT Operating System Chrome Productivity Managed IT Services Firewall Disaster Avoiding Downtime Tablet IT Solutions Telephone Systems Spam WiFi BDR Managed IT Search Cybersecurity Passwords Holiday Mobility Data Management The Internet of Things Risk Management Remote Computing Cybercrime Unified Threat Management History Remote Monitoring Hard Drives Employer-Employee Relationship Budget Saving Time Automation Apple Hacking Vendor Management VPN Best Practice Facebook iPhone Computers Customer Relationship Management Proactive IT Recovery Phone System User Error Collaboration Law Enforcement Office Tips Marketing Wireless Technology Phishing Password Big Data Hosted Solution Wearable Technology USB Telephony Content Filtering Maintenance Analytics PowerPoint Encryption Virus Gmail Router Data Recovery Lithium-ion battery Bring Your Own Device Data Backup Antivirus Office 365 Current Events Shortcut Social Humor Administration Printer Money Wireless Unsupported Software Outlook Google Drive Cloud Computing Private Cloud Save Time Users Government App Cost Management Windows 8 Intranet Bandwidth Printer Server Work/Life Balance Audit Laptop HaaS OneNote Business Intelligence Data Security Trending Education Point of Sale Net Neutrality IT COnsultant Computer Repair Social Engineering Tech Support Paperless Office Automobile End of Support Instant Messaging IT Support Emails Fax Server Windows 10 Social Networking HIPAA Workplace Entertainment Internet Exlporer Benefits DDoS Computer Accessories Vulnerability Streaming Media Internet of Things Uninterrupted Power Supply online currency Mouse Compliance Identity Theft Data Protection Solid State Drive Flexibility Two-factor Authentication Data Storage Managing Stress SaaS Excel Samsung Efficency Wi-Fi Emergency Network Congestion Travel Applications Help Desk hacker Update Customer Service Politics Biometrics Personal Information Retail Display Transportation Virtual Reality Meetings Augmented Reality Computer Care Battery Robot IT consulting Hiring/Firing Human Resources WIndows Server 2008 Data storage Running Cable Windows Ink risk management Ebay Books Computing Reliable Computing Smart Technology Video Games Patch Management Google Maps Document Management Hard Drive Data Breach Advertising Bloatware Commerce Legal Regulation Touchpad Mobile Device Images Managed Security Uograde Sync Scam Branding Distributed Denial of Service Twitter Data Loss iOS Managed IT Service Surge Protector Adobe WIndows 7 Managed IT Services Employer Employee Relationship Sports Operating Sysytem eWaste Television Computer Fan Inbound Marketing Worker Commute 3D Printing PDF Regulations Licensing Scalability Files Dark Web Value Wiring Safety Text Messaging Screen Mirroring Information Cameras User ISP How To Chromecast Science Debate Upgrades Presentation Artificial Intelligence Virtual Desktop Cast Bluetooth Best Available Windows 10s Training Programming Blogging Administrator Colocation IT Technicians Nanotechnology Consultant The Blindside Of SharePoint Tablets Hard Disk Drive Company Culture Black Market Website Access Root Cause Analysis Touchscreen IT Security HBO Nokia Teamwork NFL best practices Cleaning OneDrive Amazon CrashOverride Busines Continuity Experience Near Field Communication Keyboard Avoid Downtime Co-managed IT Networking IT Management Word data breach Settings Music Lifestyle Tutorial Software as a Service Microblogging Youtube Sales Taxes Managed Service Provder Google Docs Storage Webinar Supercomputer Electronic Medical Records Webinar IT service Microsoft Excel IT Budget Domains Gift Giving Mobile IT solutions Reputation File Sharing Professional Services Buisness Shadow IT Relocation