fbpx

Your IT Support Experts

We partner with many types of businesses, and strive to eliminate IT issues before they cause expensive downtime.

Home

Partners

IT Services

Understanding IT

Blog

News

About Us

Contact Us

Support

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

JensenIT Blog

JensenIT has been serving the Illinois area since 1991, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Could Your IT Repair Itself After a Cyberattack?

Could Your IT Repair Itself After a Cyberattack?

Cybersecurity is a massively important consideration for today’s businesses, and as a result, managing it is often given a considerable amount of time. However, recent developments suggest that this time can potentially be reduced by the use of “self-healing” security software. We know that this sounds a little out there, but stay with us! We’ll explain.

Self-Healing Software Has Been Developed and Adopted

ABN Amro, a major Dutch bank, and Nederlandse Organisatie voor Toegepast Natuurwetenschappelijk Onderzoek (also known as the Netherlands Organisation for Applied Scientific Research, or TNO) partnered up to design improved ways to protect the software that financial institutions rely on. The result: a system that draws on the human body for inspiration.

A Brief Biology Lesson

Here’s the thing about the human body: it’s constantly refreshing itself. Scientifically, your body contains none of the cells that it did 10 years ago. Not only do cells naturally die off and need to be replaced, the body will ostracize cells it suspects to be infected and replace them with healthy ones. 

This periodic replacement, known as the principle of disposability, offers a pair of benefits when translated to cybersecurity:

  • Undetected infections are protected against
  • If there is suspicion of an infection, your protections are automatically elevated

The system that was created to emulate this principle of disposability does so quite well, allowing it to repair itself and register when it needs to do so.

There is Little Question That These Tools Could Be Useful to Businesses...

...and fortunately, this could be a reality sooner than later. Reports have come out suggesting that this software will soon be made public… so before long, cybersecurity may become that much simpler to keep managed.

In the meantime, JensenIT is here to serve the same purpose, monitoring your business’ IT to ensure that all is well and working properly. Find out what we can offer you by giving us a call at (847) 803-0044.

3 Critical IT Processes that Modern Businesses Nee...
New Developments in Ransomware are Potentially Dev...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Saturday, April 27, 2024

Captcha Image

Customer Login


Latest Blog

It isn’t easy to be a member of the workforce right now. While we won’t cover them in detail, plenty of stressors—related to and separate from the workplace—can easily impact an employee’s performance. As a result, it is often in your company’s best interest to invest in your team’s well-being, and one way to do this is by implementing and encouraging the use of different technologies.

Contact Us

Learn more about what JensenIT can do for your business.

JensenIT
1689 Elk Blvd
Des Plaines, Illinois 60016

Sign up for our Newsletter!

Hey! Before you go, subscribe to our newsletter for IT tech tips and advice!