May 2025 Volume 7

OPERATIONS & MANAGEMENT

Patches Software patches fix bugs and optimize software. More importantly, they fix security vulnerabilities that can be exploited by cybercriminals. Keeping patches current by applying them within 30 days at the latest is crucial to keeping your systems more secure. Restart Everyone knows what “Restart” is, but did you know “Restart” and “Shut down” are not the same? “Restart” can be a troubleshooting tool, and “Shut down” is just, well, shutting down. In general, restarting your computer stops all system processes and restarts the system from scratch. A restart can apply updates, clear memory for improved performance, close background processes you don’t need, and even fix internet connection issues. For quick troubleshooting, start with “Restart”. Router Routers are hardware devices that connect multiple switches and their networks to form a larger network, which can be in a single location or across multiple locations. Routers also connect devices to the internet. They forward data packets between computer networks, allowing several devices to share a single internet connection. Routers control traffic to ensure that data packets pass through the most efficient paths to their destination. Just as a switch connects multiple devices to create a network, a router connects multiple switches, and their respective networks, to form an even larger network. These networks may be in a single EoL software is no longer supported by the vendor. This means there are no more security patches or functionality updates, leaving businesses potentially vulnerable to security risks, compliance issues, and incompatibility issues. For planning and budgeting, it’s important to be aware of end-of life schedules for business-critical software. Here are upcoming end-of-life dates for commonly used Microsoft products: location or across multiple locations. Software End-of-Life (EoL)

Virtual Local Area Network (VLAN) VLANs establish the logical connection of computers, servers, and other network devices into a virtual LAN regardless of their physical locations. They can prioritize data, separate private and public networks, or secure specific devices. Besides being a tool for cybersecurity, VLANs ease network resource management and workflow optimization processes for businesses and organizations. Vulnerability Testing vs. Penetration Testing A vulnerability assessment identifies potential weaknesses in a system by scanning for vulnerabilities, while penetration testing actively attempts to exploit those vulnerabilities to assess their severity and potential damage. Penetration testing will often simulate a real-world attack, essentially showing how a hacker might use vulnerabilities to gain access to a system using technology or social engineering. Penetration testing is a more in-depth and aggressive process than a vulnerability test. Zero Trust Security Model The zero-trust security model works on the premise that everything — people, applications and devices — poses a risk to your network and must prove trustworthy before accessing your organization’s network or data. This means every person, application, and device must be authenticated and authorized each time they request access. By insisting on verification and authentication at every step, zero trust makes it difficult for a hacker to gain access through a compromised user account or device. Zero trust should not be mistaken for a single solution or a platform. You can’t just buy it and implement it with a click of a button. Zero trust cybersecurity is a strategy — a framework that needs to be applied systematically in your organization. I hope this short glossary will be valuable as a quick reference the next time you’re heading into a discussion with your IT team.

Jim Kerr is President of CRU Solutions, a leading Cleveland-based managed IT services firm he founded in 1982. CRU Solutions has been serving the team at FIA for over 10 years. www.crusolutions.com Email: jim.kerr@crusolutions.com

• Microsoft Windows 10 – October 2025 • Microsoft Publisher – October 2026 • Microsoft Server 2019 – January 2029 Switch

Switches are hardware devices that connect devices within a network, like computers, printers, and servers, so they can share information and communicate with each other. Switches are used in local area networks (LANs), like home Wi-Fi networks. They process data via packet switching including receiving it, processing it, and sending it to the intended device. Switches have multiple ports (4 to 52 ports) for devices to communicate within the LAN.

FIA MAGAZINE | MAY 2025 55

Made with FlippingBook - Online Brochure Maker