631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Intro to Your Tech: Zero-Day

Intro to Your Tech: Zero-Day

While a technology exploit or vulnerability is never a good thing, hearing one described as “zero-day” adds another level of sinister malice to the term. However, it is still important to understand what is meant by zero-day, which is why we are going to review that term below.

First, it is important that we understand what a vulnerability is, so that we can better understand why a zero-day one is so bad. In short, a vulnerability is a flaw in a piece of software that can be exploited by a cybercriminal. A cybercriminal that uses malware to attack a system needs a way to introduce that malware. Vulnerabilities provide them with the means to do so.

What Does Zero-Day Signify?
For a vulnerability to be “zero-day,” it must be known and in the wild with no patch or update to fix it - effectively, the software developers have zero days left to resolve the vulnerability with no chance of misuse by a cybercriminal.

This often happens when a black-hat hacker, rather than a white-hat cybersecurity researcher, discovers a software vulnerability first. Under ideal circumstances, the researcher will find and report the flaw to the developer first, and a fix can be created before cybercriminals ever catch wind of the opportunity. However, if a hacker finds the vulnerability first, they have free reign to use it to their own ill-intentioned ends.

Protecting Against These Threats
The key to securing your systems against threats of all kinds, even zero-day threats, can be summed up in one word: proactivity. It is crucial that you update your organization’s technology--especially if these updates pertain to security standards--as quickly as possible, so that you are as well-protected as possible.

One of the most telling things about zero-day threats and vulnerabilities is how successful they still are after they have been turned into an n-day vulnerability. An n-day vulnerability is one that has been discovered and fixed. However, these fixes only work if they have been applied to a business’ technology. The infamous Equifax breach was carried out using a vulnerability that had been discovered, reported, and patched earlier that year. Equifax had not updated their systems by applying the patch, leaving the vulnerability available for those responsible to utilize.

In short, any business needs to be sure to keep their systems as up-to-date as possible to prevent threats--if not zero-day, then at least n-day--from being a hindrance for their operations. Suffolk Computer Consultants can help. We’ll make sure your systems are up to date on your behalf, and that your security is top-notch. Call us at 631-905-9617 for more information.

How Managed IT Depends on Remote Monitoring and Ma...
Which Browser Do You Prefer?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Cybersecurity Productivity Malware User Tips Tech Term Managed IT Services Backup Smartphones Microsoft Communications Hackers Efficiency Hardware Internet Passwords Communication Browser Business Management Business Google Android Outsourced IT Hosted Solutions Ransomware Email Small Business Software Data Recovery VoIP Mobile Device Wi-Fi Data Backup Microsoft Office Windows 10 Alert Smartphone Cloud Computing IT Services Applications Innovation Collaboration Social Media Holiday IT Support Internet of Things Data Network Save Money Bandwidth Business Intelligence Users Employer-Employee Relationship Managed IT Services Miscellaneous Saving Money Wireless Mobile Devices Router Access Control Computer Password Twitter Apps VoIP Gadgets Government Patch Management Settings Business Continuity Data Breach Data Management Networking Vulnerability Phishing Information Virtualization Excel BDR Office Word Workplace Tips Blockchain Automation Marketing Analytics Hacking Computers Wireless Charging Physical Security Managed IT Service Paperless Office Artificial Intelligence Data Protection Windows Gmail Website Office 365 Cost Management IT Support Remote Monitoring Dark Web Remote Monitoring and Management Facebook Law Enforcement Retail Spam Medical IT WiFi Cybercrime Mobile Device Management Tip of the week Remote Computing Scam Tech Terms Connectivity Chrome Workers Virus VPN Mobility Virtual Assistant Managed Service BYOD Battery Cortana Company Culture How To Productivity Compliance Politics App Plug-In Ink Telephone System Backup and Disaster Recovery Content Filtering Hiring/Firing Staffing Document Management Tactics Travel Error Websites Microsoft Teams Tablet Cables Security Cameras HIPAA e-waste Big Data Trends Wireless Internet Proactive IT Work/Life Balance Gadget IT budget PowerPoint Troubleshooting Information Technology SSD Managed IT Digital Internet Explorer Live Streaming Touchscreen Managing Stress Knowledge Voice over Internet Protocol Wearables Hard Drive disposal Files Telephony Upgrade Reporting Office Tips Automobile Machine Learning A.I. Telephone Systems File Sharing Help Desk Printer Server Botnet User Tip Shortcut IT Management Sports Remote Support Update Entertainment Biometrics Inventory Healthcare Recovery Edge Threat WhatsApp Microsoft Office 365 Disaster Recovery Dongle G Suite Google Drive Comparison Hard Drives Printers Processors Value Voice over IP Maintenance Telecommute Movies Remote Control User Security Certification Cleaning Analysis CrashOverride Hosted Solution Outlook Access Lead Generation Mobile Security Amazon Data Security Server Laptop Printing Two-factor Authentication Authentication Bring Your Own Device Specifications Spyware eCommerce GDPR Antivirus Google Maps Data loss Unified Communications Spam Blocking Business Technology Operating System Telecommuting Network Attached Storage Streaming Media Copy Apple Profitability Phone System Paper News Tech Support Authorization Education Smart Technology Technology Tips Hybrid Cloud Multi-Factor Security Conferencing HP Database Licensing Online Shopping Storage Staff RAM Email Management Sales Safety Training WannaCry Environment Millennials Spotify Server Management Downloads Paste iPhone Eliminating Downtime SaaS Scalability Instagram Budget Quick Tips DDoS Video Games Money Customer Relationship Management Synergy Competition Regulation Worker Employer Employee Relationship IP Address IaaS Credit Cards Television Fun Customer Service Emoji Freedom of Information Printer Mobile Office HaaS Domains Encryption Unified Threat Management Yahoo Windows 10 Public Speaking Current Events Leadership Search Vendor Management Presentation Computer Care Autocorrect Emergency Lithium-ion battery Augmented Reality Net Neutrality Avoiding Downtime Personal Information 5G Scheduling Dark Data Wireless Technology Gaming Console IBM Samsung The Internet of Things Hacker Managed Service Provider

Newsletter Sign Up