What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services?
The probability of this happening is high if we consider that:
● Two out of three companies suffered a cyber-attack last year[1].
● A hacker could break into 93% of companies[2].
● There are more than 170,000 vulnerabilities and more are added every year[3].
” Patch management doesn’t just fix bugs, or improve usability or performance; it addresses known security vulnerabilities.”
How to protect yourself?
To secure your systems, you need a defence-in-depth or layered strategy, which includes the design of secure architecture, risk management, a business continuity plan, and incident monitoring and response.
Patch management is one of the most important and effective security countermeasures that you can apply to eliminate vulnerabilities in your systems.
Vulnerabilities and patches
Cyber-attacks, which take advantage of system vulnerabilities, can have a major impact on the integrity, availability and confidentiality of the information handled by those systems. According to the Canadian Center for Cyber Security (CCCS), patching operating systems and applications is the second most important IT security action an organisation can take to minimise intrusions and their impacts.[4]
Patch management is a 4-stage process:
Good practices and recommendations in patch management
● If a vulnerability has not yet been exploited, carefully weigh the security risks of not patching against the operational risks of patching without extensive testing first.
● You must ensure that users cannot disable patches, especially critical patches.
● The software inventory should include not only what software is installed, but also its version.
● You must balance your security needs with your needs for usability and availability.
● You must ensure that patch management is efficient to avoid task overload situations.
Patch management can be carried out simply using automated tools, such as Faronics Cloud Deploy.
To find out more, watch our webinar on Youtube.
[1] https://safeatlast.co/blog/cybercrime-statistics/
[2] https://www.ptsecurity.com/ww-en/analytics/external-pentests-results-2020/