Bug

26th December 2019 | Cybrary Bug


Moth in the Mark II

A Bug is an unexpected and relatively small defect, fault, flaw, or imperfection in an information system or device. These small defects or faults are generally due to human error when writing the source code or in the design of the medium that causes the system or crash or simply not work. Bugs can sometimes end up as security vulnerabilities that need to be patched through updates for the relevant software or device. 

The origin of this term is allegedly from the IBM Mainframe days in the early 1950s when a moth was found dead within the internals of the room-sized computer. This “BUG” caused the whole mainframe to malfunction, bringing the word “Bug” into our common language usage.

What Does A Bug Mean For My SMB?

SMBs need solutions in place to manage bugs.  These typically come in the form of a patch management solution to quickly install software fixes from vendors when released to the public.  Patches often address important security vulnerabilities. SMBs and MSPs need to plan ahead by creating policies that dictate how quickly to react based upon the criticality of a particular vulnerability.  For CyberHoot users, the Policy Template library contains a Vulnerability Alert Management Process (VAMP) in place. With this process in place, you have clear guidelines for when to jump and how high to jump for a given vulnerability or exposure.

Consider deploying a cloud-based patch management solution to automatically update software whenever and wherever necessary. Most Managed Service Providers leverage one of the big three Remote Monitoring and Management (RMM) solutions (ConnectwiseDatto, and Kaseya) for patching their managed systems. These RMM solutions also provide monitoring, and remote access in addition to tested and validated patching services to their clients.

Standalone patch management solutions for companies not using the above-mentioned RMM solutions include ManageEngine and Automox.

SMB PROTECTIONS BEYOND PATCH MANAGEMENT

In addition to adopting a patch management system, CyberHoot recommends the following best practices to protect individuals and businesses against, and limit damages from, online cyber attacks:

Sources: NCSD Glossary, Historical Reference

CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like: 

Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more
QR Codes Are Back (They Still Want Your Password)

QR Codes Are Back (They Still Want Your Password)

Remember 2020? We scanned QR codes for everything. Restaurant menus. Parking meters. That awkward moment at a...

Read more