fbpx

Your IT Support Experts

We partner with many types of businesses, and strive to eliminate IT issues before they cause expensive downtime.

Home

Stores

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

Free Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you! Sign Up Today

JensenIT Blog

Could Your IT Repair Itself After a Cyberattack?

Could Your IT Repair Itself After a Cyberattack?

Cybersecurity is a massively important consideration for today’s businesses, and as a result, managing it is often given a considerable amount of time. However, recent developments suggest that this time can potentially be reduced by the use of “self-healing” security software. We know that this sounds a little out there, but stay with us! We’ll explain.

Self-Healing Software Has Been Developed and Adopted

ABN Amro, a major Dutch bank, and Nederlandse Organisatie voor Toegepast Natuurwetenschappelijk Onderzoek (also known as the Netherlands Organisation for Applied Scientific Research, or TNO) partnered up to design improved ways to protect the software that financial institutions rely on. The result: a system that draws on the human body for inspiration.

A Brief Biology Lesson

Here’s the thing about the human body: it’s constantly refreshing itself. Scientifically, your body contains none of the cells that it did 10 years ago. Not only do cells naturally die off and need to be replaced, the body will ostracize cells it suspects to be infected and replace them with healthy ones. 

This periodic replacement, known as the principle of disposability, offers a pair of benefits when translated to cybersecurity:

  • Undetected infections are protected against
  • If there is suspicion of an infection, your protections are automatically elevated

The system that was created to emulate this principle of disposability does so quite well, allowing it to repair itself and register when it needs to do so.

There is Little Question That These Tools Could Be Useful to Businesses...

...and fortunately, this could be a reality sooner than later. Reports have come out suggesting that this software will soon be made public… so before long, cybersecurity may become that much simpler to keep managed.

In the meantime, JensenIT is here to serve the same purpose, monitoring your business’ IT to ensure that all is well and working properly. Find out what we can offer you by giving us a call at (847) 803-0044.

3 Critical IT Processes that Modern Businesses Nee...
New Developments in Ransomware are Potentially Dev...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Monday, September 20, 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.jensenit.com/

Customer Login

Latest Blog

We throw the term “best practice” around a lot… enough that, without an appreciation for what the term actually means, it can start to sound like just another buzzword that the IT guy is using to sound more impressive. We assure you that this is not the case, and that the term “best practice” actually does mean something.

Contact Us

Learn more about what JensenIT can do for your business.

JensenIT
1689 Elk Blvd
Des Plaines, Illinois 60016

Sign up for our Newsletter!

Hey! Before you go, subscribe to our newsletter for IT tech tips and advice!