WEBVTT

00:00:00.000 --> 00:00:06.380 align:middle line:90%


00:00:06.380 --> 00:00:08.840 align:middle line:84%
In this video, we're talking
about application reduction

00:00:08.840 --> 00:00:12.120 align:middle line:90%
and why you should slim it down.

00:00:12.120 --> 00:00:15.340 align:middle line:84%
So when it comes to
application software,

00:00:15.340 --> 00:00:18.700 align:middle line:84%
it is important, as important,
to update your application

00:00:18.700 --> 00:00:24.730 align:middle line:84%
software on a regular basis as
it is your operating system.

00:00:24.730 --> 00:00:26.430 align:middle line:84%
So application
software typically

00:00:26.430 --> 00:00:30.870 align:middle line:84%
has a lot of different flaws
that come out over time.

00:00:30.870 --> 00:00:34.410 align:middle line:84%
And as such, the
application software

00:00:34.410 --> 00:00:37.260 align:middle line:84%
tends to get a lot of updates,
just like your operating system

00:00:37.260 --> 00:00:38.660 align:middle line:90%
does.

00:00:38.660 --> 00:00:43.050 align:middle line:84%
It's simply just another
piece of software.

00:00:43.050 --> 00:00:47.670 align:middle line:84%
Zoom, Adobe, WhatsApp,
every application software

00:00:47.670 --> 00:00:49.350 align:middle line:84%
will generally have
updates for it,

00:00:49.350 --> 00:00:50.980 align:middle line:84%
or at least it
should have updates.

00:00:50.980 --> 00:00:54.060 align:middle line:90%


00:00:54.060 --> 00:00:58.470 align:middle line:84%
Now, when we think about
what's loaded on our computer,

00:00:58.470 --> 00:01:00.600 align:middle line:84%
some users may have a
lot of things on there

00:01:00.600 --> 00:01:03.660 align:middle line:84%
that they haven't
used in a long time.

00:01:03.660 --> 00:01:09.990 align:middle line:84%
Say for, this example, this
user used Zoom for a meeting

00:01:09.990 --> 00:01:13.240 align:middle line:90%
with a vendor a month ago.

00:01:13.240 --> 00:01:16.150 align:middle line:84%
It's not something that they
use in their everyday work.

00:01:16.150 --> 00:01:19.540 align:middle line:84%
However, it was kind of a one
off meeting that they had.

00:01:19.540 --> 00:01:25.810 align:middle line:84%
Now, Adobe, they have Adobe
Illustrator on their computer

00:01:25.810 --> 00:01:28.730 align:middle line:84%
to make a flyer a year ago
and they never used it again.

00:01:28.730 --> 00:01:31.540 align:middle line:84%
So we tend to have all
these different programs

00:01:31.540 --> 00:01:34.000 align:middle line:84%
on our computer
that we never use.

00:01:34.000 --> 00:01:36.100 align:middle line:84%
However, the problem
with this is,

00:01:36.100 --> 00:01:43.300 align:middle line:84%
as we saw in the previous
example, software over time

00:01:43.300 --> 00:01:44.440 align:middle line:90%
starts developing bugs.

00:01:44.440 --> 00:01:47.110 align:middle line:84%
People find more and more
bugs in the software.

00:01:47.110 --> 00:01:51.570 align:middle line:84%
So the more of these programs we
leave dormant on our computer,

00:01:51.570 --> 00:01:54.360 align:middle line:84%
the more that we leave
ourselves open to attack,

00:01:54.360 --> 00:01:57.680 align:middle line:84%
especially if you don't
use these for a long time.

00:01:57.680 --> 00:01:59.290 align:middle line:84%
Again, in this
example, this person

00:01:59.290 --> 00:02:04.600 align:middle line:84%
has Adobe Illustrator software
on the computer that they

00:02:04.600 --> 00:02:07.030 align:middle line:84%
haven't used for a year,
which means it hasn't updated

00:02:07.030 --> 00:02:09.340 align:middle line:84%
in a year most
likely, which means

00:02:09.340 --> 00:02:12.820 align:middle line:84%
it has a lot of
old flaws sitting

00:02:12.820 --> 00:02:15.730 align:middle line:84%
on that piece of software
that could be an attack

00:02:15.730 --> 00:02:19.900 align:middle line:84%
vector for a malicious hacker,
making it very, very easy

00:02:19.900 --> 00:02:23.740 align:middle line:84%
because all these updates that
should be applied to fix these

00:02:23.740 --> 00:02:24.700 align:middle line:90%
are just sitting there.

00:02:24.700 --> 00:02:27.780 align:middle line:84%
So they can kind of
cherry pick which

00:02:27.780 --> 00:02:29.770 align:middle line:84%
exploit they want to
launch on this computer.

00:02:29.770 --> 00:02:32.620 align:middle line:90%


00:02:32.620 --> 00:02:35.300 align:middle line:90%
So reducing your attack surface.

00:02:35.300 --> 00:02:38.140 align:middle line:84%
So reducing your attack
surface essentially means

00:02:38.140 --> 00:02:42.500 align:middle line:84%
making the area that you can
be attacked from much smaller,

00:02:42.500 --> 00:02:45.370 align:middle line:84%
making you a smaller,
harder target to hit.

00:02:45.370 --> 00:02:47.110 align:middle line:84%
So unused programs
on your computer

00:02:47.110 --> 00:02:52.360 align:middle line:84%
can be just as vulnerable
on your computer.

00:02:52.360 --> 00:02:55.420 align:middle line:84%
So we do need to
keep that in mind.

00:02:55.420 --> 00:02:58.210 align:middle line:84%
Most programs will not
attempt to update itself

00:02:58.210 --> 00:02:59.710 align:middle line:90%
if it's not ran.

00:02:59.710 --> 00:03:02.620 align:middle line:84%
There are a few
exceptions to this rule,

00:03:02.620 --> 00:03:04.830 align:middle line:84%
but a lot of programs
don't have an auto update

00:03:04.830 --> 00:03:08.920 align:middle line:84%
in there sitting on your
computer constantly running.

00:03:08.920 --> 00:03:12.070 align:middle line:84%
So by uninstalling programs
that we no longer need

00:03:12.070 --> 00:03:14.530 align:middle line:84%
we can help reduce
an attack surface.

00:03:14.530 --> 00:03:17.230 align:middle line:84%
Also, that could
help with obviously

00:03:17.230 --> 00:03:19.810 align:middle line:84%
how much space is being
used by our computer, how

00:03:19.810 --> 00:03:24.670 align:middle line:84%
cluttered our system is, and the
overall health of our computer.

00:03:24.670 --> 00:03:28.270 align:middle line:84%
Application software
that we do need to keep,

00:03:28.270 --> 00:03:31.675 align:middle line:84%
we should be checking for
updates on a regular basis.

00:03:31.675 --> 00:03:34.300 align:middle line:90%


00:03:34.300 --> 00:03:37.350 align:middle line:84%
So in wrapping up, your
application software

00:03:37.350 --> 00:03:41.010 align:middle line:84%
is just as important to update
as your operating system.

00:03:41.010 --> 00:03:43.770 align:middle line:84%
We always need to
keep which application

00:03:43.770 --> 00:03:48.630 align:middle line:84%
that we're deciding to remain
on our computer up to date.

00:03:48.630 --> 00:03:51.810 align:middle line:84%
And finally, audit your
software from time to time.

00:03:51.810 --> 00:03:55.020 align:middle line:84%
If you don't need it
anymore, remove it.

00:03:55.020 --> 00:03:58.820 align:middle line:84%
That's the best thing
you can do for that.

00:03:58.820 --> 00:04:00.790 align:middle line:84%
So this was about
application software.

00:04:00.790 --> 00:04:03.370 align:middle line:84%
In the next video, we're
going to take a look at a VPN,

00:04:03.370 --> 00:04:05.620 align:middle line:84%
what it is, and why
they're important.

00:04:05.620 --> 00:04:06.710 align:middle line:90%
Thank you for watching.

00:04:06.710 --> 00:04:08.760 align:middle line:90%
I'll see you in the next video.

00:04:08.760 --> 00:04:10.000 align:middle line:90%