Velocity Technology Partners Blog

Velocity Technology Partners has been serving Athens, Gainesville and North Georgia since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Need To Be Familiar With Patching Terminology

You Need To Be Familiar With Patching Terminology

Over the past several months, while watching the news or reading about business and technology, you’ve probably encountered a few words, such as ‘ransomware’ ‘exploit weakness’, and ‘security patch’. These terms are used often, and you may be confused as to what they really mean, and how they relate to you and the security of your business’ data.

In recent months, ransomware attacks like WannaCry and other malware have made headlines, with cyber criminals exploiting weaknesses in networks, application deployments, and operating systems. What is very hard for some people to understand is that often the weaknesses being exploited are known by software developers, who have released security updates known as ‘patches.’

For many small business owners and personal PC users, a better understanding of types of patches, how they work, when they’re released, and how to access them might be all that stands between a hacker and your network. Here are five terms that are associated with the continuous software updates that aim to protect users from data loss or worse.

Patch Tuesday - For those who allow their computer to update and install patches automatically, it might have never really occurred to them that there was a schedule as to when Microsoft released patches. Similar to how new movies are released or video games are launched on specific days of the week, Microsoft releases patches on the second (and sometimes fourth) Tuesday of each month. With newer operating systems and software versions, there might come a time where Patch Tuesday becomes obsolete in favor of a real-time data exchange where software and applications are constantly updated as needed.

Security Patching - This is what most people think of when they think of a patch for a piece of software or an application. It’s a series of data and files that fix or mitigate the threat of a known issue or vulnerability. These are generally what are provided on official patch days, like Patch Tuesday. That is, of course, unless the patch is a zero-day or immediate release, an action usually reserved for major security risks or weaknesses found after they have been exploited.

Hotfix - Sometimes referred to as a ‘Quick-fix Update’ ‘Quick-fix Engineering Update’ or ‘General Distribution Release’, a hotfix is a small patch that fixes a single bug or vulnerability that is significant enough that it should not wait until the next scheduled patch release. Although, Microsoft itself no longer uses the term ‘hotfix’ in an official capacity, the term is still widely used by majority of the industry.

Zero Day Vulnerability - This is a specific type of weakness that is not discovered or disclosed until the hackers are already exploiting it. This is called ‘zero day’ because software developers and advocates have no time - or zero days - to create a patch or develop a work around, leaving both users and developers scrambling to keep data safe.

Whitelisting - As related to malware and ransomware, whitelisting is the process in which a patch or application is declared safe, allowed access to the network, or otherwise approved for a certain network or program. The term ‘whitelist’ comes from the opposite of ‘blacklist’. Made popular during the Cold War, blacklist refers to a list of people or items that are banned, rejected, or labeled in a negative way. Whitelisting was tossed around when so many WannaCry victims had the security patch needed since March. Many establishments were waiting for internal IT departments to test and officially ‘whitelist’ the patch which would allow the installation of the security patch needed to eliminate the vulnerability exploited by the WannaCry ransomware.

Truthfully, there is a lot more to patches than just the five terms above - and the more your business relies on technology the more important proper maintenance of technology - including patches and updates, becomes to your continued success. In the end, working with Velocity Technology Partners will help you make sure that your business is always properly updated, with pertinent, whitelisted patches. Call us at (800) - 983 - 5765 to learn more.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Productivity Company Culture Tablets App Updates SaaS Project Management Microsoft Excel Legal Licensing Government Communications Content Filter Law Enforcement Money Google Ciminal WIndows Server 2008 Streaming Media Hosted Solution Email Managed IT Services Gmail Sales Retail Smartphones Hackers Softphones BDR Operating System Update Computer Forensics Charger Office 365 Outlook Software as a Service Congratulations File Sharing Specifications Innovation Gadgets Adobe App store Windows Ink Blockchain Network Security Small Business Application Wi-Fi Data Loss Word Financial Google Assistant BYOD Twitter IoT Software Business Management Business Data Travel Evernote Data Privacy Screen Mirroring Unsupported Software OneNote Virtualization Flexibility Microsoft Word Data Backup Employer-Employee Relationship Telephone Systems Managed Service Provider Education Sync Data Theft Cybersecurity Remote Monitoring Two-factor Authentication Apple eWaste Networking Data Breach Vulnerability Encryption NFL Chromebook Identity Theft Identity Big Data Conferencing Google Maps Mobile Security Language Bring Your Own Device Lifestyle Android Google Docs Efficiency Vendor Management MSP Automation Google Drive Telephone Tech Support Data Recovery IT Solutions Antivirus Internet Cortana Applications Cloud Gifts IT Support Browser Data Protection Compliance Business Computing Chrome Technology iPhone Tip of the Week Computing IT Management Hybrid Cloud Value Holiday VPN PowerPoint Windows 10 Identities Phishing Credit Cards Patch Management Printing Managing Stress Data Management Backup User Tips Communication Internet of Things Virus Workers Hosted Solutions Cleaning Monitoring Thank You Safety Computer Risk Management Data Security Content Filtering Comparison Security Management Wireless Technology Sports Wireless Charging Redundancy Artificial Intelligence Cast Server Microsoft Office Disaster Recovery Mobility WannaCry Windows Connectivity Financial Technology Router Tech Term Proactive Managed IT services Social Engineering Marketing Proactive IT HBO Cybercrime Best Practice Cost Management Websites Personal Information Network Apps History Social Media Saving Money Remote Computing Students Commerce Outsourced IT Politics Memory IT budget Work/Life Balance Smart Tech The Internet of Things intranet Unified Communications Passwords Fraud Mobile Device Management Legislation Emergency Collaboration Data Storage Best Practices Excel User Error Business Continuity Privacy Edge Alert Shortcut VoIp Analysis Cloud Computing Managed IT IT Services Spam Smartphone Gamification Hard Drive Storage Mobile Devices Ransomware Spyware Malware IT support WiFi Microsoft Wireless Internet Audit Device Security Maintenance Computers Hardware FAQ Devices