{"id":237575,"date":"2022-03-28T19:39:24","date_gmt":"2022-03-29T02:39:24","guid":{"rendered":"https:\/\/www.faronics.com\/?p=237575"},"modified":"2025-02-12T02:20:43","modified_gmt":"2025-02-12T10:20:43","slug":"cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","status":"publish","type":"post","link":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","title":{"rendered":"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU"},"content":{"rendered":"<div>\n<p><b><span lang=\"ES\">What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services?<\/span><\/b><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">The probability of this happening is high if we consider that:<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">Two out of three companies suffered a cyber-attack last year<a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><span>[1]<\/span><\/sup><\/a>.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">A hacker could break into 93% of companies<a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftn2\" name=\"_ftnref2\" title=\"\"><sup><span>[2]<\/span><\/sup><\/a>.<\/span><\/p>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">There are more than 170,000 vulnerabilities and more are added every year<a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftn3\" name=\"_ftnref3\" title=\"\"><sup>[3]<\/sup><\/a>.<\/span><\/p>\n<\/div>\n<div>\n<div>\n<div>\n<p>&nbsp;<\/p>\n<h4 style=\"text-align: center;\"><span lang=\"ES\">&#8221; Patch management doesn\u2019t just fix bugs, or improve usability or performance; it addresses known security vulnerabilities.&#8221;<\/span><span lang=\"ES\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<p><b><span lang=\"ES\">How to protect yourself?<\/span><\/b><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">To secure your systems, you need a defence-in-depth or layered strategy, which includes the design of secure architecture, risk management, a business continuity plan, and incident monitoring and response.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\"><a href=\"https:\/\/faronicscloud.com\/pages\/software-updater\">Patch management<\/a> is one of the most important and effective security countermeasures that you can apply to eliminate vulnerabilities in your systems.<\/span><\/p>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">Vulnerabilities and patches<\/span><\/b><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">Cyber-attacks, which take advantage of system vulnerabilities, can have a major impact on the integrity, availability and confidentiality of the information handled by those systems. According to the Canadian Center for Cyber \u200b\u200bSecurity (CCCS), patching operating systems and applications is the second most important IT security action an organisation can take to minimise intrusions and their impacts.<a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><span>[4]<\/span><\/sup><\/a><\/span><\/p>\n<\/div>\n<div>\n<div>\n<p><span lang=\"ES\">Patch management is a 4-stage process:<\/span><\/p>\n<\/div>\n<div>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"624\">\n<tbody>\n<tr>\n<td width=\"200\" valign=\"top\"><a href=\"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-6\" rel=\"attachment wp-att-237576\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-8.png\" alt=\"\" width=\"282\" height=\"282\" class=\"aligncenter size-full wp-image-237576\" \/><\/a><\/td>\n<td width=\"424\" valign=\"top\"><b><span lang=\"ES\">1) Identify the patches: <\/span><\/b><span lang=\"ES\">make sure you are up to date with the updates<\/span><\/p>\n<p><b><span lang=\"ES\">2) Test the patch:<\/span><\/b><span lang=\"ES\"> Test the patch before applying it to verify that it is compatible with your existing software and environment.<\/span><\/p>\n<p><b><span lang=\"ES\">3) Notify those affected<\/span><\/b><\/p>\n<p><b><span lang=\"ES\">4) Install the patch:<\/span><\/b><span lang=\"ES\"> Apply the security patches as soon as possible to ensure the security of the devices. To avoid interruptions, schedule updates and patches outside of business hours.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">\u00a0<\/span><\/b><\/p>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">Good practices and recommendations in <a href=\"https:\/\/faronicscloud.com\/pages\/software-updater\">patch management<\/a><\/span><\/b><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">If a vulnerability has not yet been exploited, carefully weigh the security risks of not patching against the operational risks of patching without extensive testing first.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">You must ensure that users cannot disable patches, especially critical patches.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">The software inventory should include not only what software is installed, but also its version.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">You must balance your security needs with your needs for usability and availability.<\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ES\">You must ensure that patch management is efficient to avoid task overload situations.<\/span><\/p>\n<\/div>\n<div>\n<div id=\"attachment_237584\" class=\"wp-caption aligncenter\" style=\"width: 400px\"><a href=\"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-7\" rel=\"attachment wp-att-237584\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-9.png\" alt=\"\" width=\"400\" height=\"242\" class=\"wp-image-237584\" \/><\/a><p class=\"wp-caption-text\">Patch management can be carried out simply using automated tools, such as Faronics Cloud Deploy.<\/p><\/div>\n<\/div>\n<div>\n<p align=\"center\" style=\"text-align: left;\"><span lang=\"ES\">Patch management can be carried out simply using automated tools, such as Faronics Cloud Deploy.<\/span><\/p>\n<\/div>\n<div>\n<p><span>To find out more, <a href=\"https:\/\/www.youtube.com\/watch?v=nekxxBdpzqM\">watch our<\/a><\/span><a href=\"https:\/\/www.youtube.com\/watch?v=nekxxBdpzqM\"><span>\u00a0<\/span>webinar on Youtube<\/a><span>.<\/span><\/p>\n<\/div>\n<\/div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div id=\"ftn1\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref1\" name=\"_ftn1\" title=\"\"><sup><span lang=\"ES\"><span>[1]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/safeatlast.co\/blog\/cybercrime-statistics\/<\/span><\/p>\n<\/div>\n<div id=\"ftn2\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref2\" name=\"_ftn2\" title=\"\"><sup><span lang=\"ES\"><span>[2]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/www.ptsecurity.com\/ww-en\/analytics\/external-pentests-results-2020\/<\/span><\/p>\n<\/div>\n<div id=\"ftn3\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref3\" name=\"_ftn3\" title=\"\"><sup><span lang=\"ES\"><span>[3]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/www.cvedetails.com\/browse-by-date.php<\/span><\/p>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftnref1\" name=\"_ftn1\" title=\"\"><sup><span lang=\"ES\"><span>[4]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/cyber.gc.ca\/en\/guidance\/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<div>\n<p>What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services?<\/p>\n<\/p><\/div>\n<div>\n<p>The probability of this happening is high if we consider that:<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 Two out of three companies suffered a cyber-attack last year<a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftn1\" name=\"_ftnref1\" title=\"\">[1]<\/a>.<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 A hacker could break into 93% of companies<a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftn2\" name=\"_ftnref2\" title=\"\">[2]<\/a>.<\/p>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 There are more than 170,000 vulnerabilities and more are added every year<a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftn3\" name=\"_ftnref3\" title=\"\">[3]<\/a>.<\/p>\n<\/p><\/div>\n<div>\n<div>\n<div>\n<p>&nbsp;<\/p>\n<p> &#8221; Patch management doesn\u2019t just fix bugs, or improve usability or performance; it addresses known security vulnerabilities.&#8221; <\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<p>How to protect yourself?<\/p>\n<\/p><\/div>\n<div>\n<p>To secure your systems, you need a defence-in-depth or layered strategy, which includes the design of secure architecture, risk management, a business continuity plan, and incident monitoring and response.<\/p>\n<\/p><\/div>\n<div>\n<p><a href=\"https:\/\/faronicscloud.com\/pages\/software-updater\">Patch management<\/a> is one of the most important and effective security countermeasures that you can apply to eliminate vulnerabilities in your systems.<\/p>\n<\/p><\/div>\n<div>\n<p>Vulnerabilities and patches<\/p>\n<\/p><\/div>\n<div>\n<p>Cyber-attacks, which take advantage of system vulnerabilities, can have a major impact on the integrity, availability and confidentiality of the information handled by those systems. According to the Canadian Center for Cyber \u200b\u200bSecurity (CCCS), patching operating systems and applications is the second most important IT security action an organisation can take to minimise intrusions and their impacts.<a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\">[4]<\/a><\/p>\n<\/p><\/div>\n<div>\n<div>\n<p>Patch management is a 4-stage process:<\/p>\n<\/p><\/div>\n<div> <a \n\n<div class=\"more\"><a href=\"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\">Continue Reading&#8230;<\/a><\/div>\n","protected":false},"author":151,"featured_media":237594,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-237575","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU - Faronics<\/title>\n<meta name=\"description\" content=\"What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services? The\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU\" \/>\n<meta property=\"og:description\" content=\"What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services? The\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\" \/>\n<meta property=\"og:site_name\" content=\"Faronics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/faronics\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-29T02:39:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-12T10:20:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1999\" \/>\n\t<meta property=\"og:image:height\" content=\"1332\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jorge Ojeda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@faronics\" \/>\n<meta name=\"twitter:site\" content=\"@faronics\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jorge Ojeda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"},\"author\":{\"name\":\"Jorge Ojeda\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#\\\/schema\\\/person\\\/1f33a5b8117ed728b756afd49eefd85c\"},\"headline\":\"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU\",\"datePublished\":\"2022-03-29T02:39:24+00:00\",\"dateModified\":\"2025-02-12T10:20:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"},\"wordCount\":435,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"inLanguage\":\"en-UK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\",\"name\":\"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU - Faronics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"datePublished\":\"2022-03-29T02:39:24+00:00\",\"dateModified\":\"2025-02-12T10:20:43+00:00\",\"description\":\"What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services? The\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb\"},\"inLanguage\":\"en-UK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-UK\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"width\":1999,\"height\":1332,\"caption\":\"Update Software Computer Program Upgrade Business technology Internet Concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\\\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#website\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\",\"name\":\"Faronics\",\"description\":\"Simplifying Computer Management\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faronics.com\\\/en-uk?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-UK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#organization\",\"name\":\"Faronics\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/en-uk\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-UK\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"width\":155,\"height\":44,\"caption\":\"Faronics\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/faronics\",\"https:\\\/\\\/x.com\\\/faronics\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/en-uk#\\\/schema\\\/person\\\/1f33a5b8117ed728b756afd49eefd85c\",\"name\":\"Jorge Ojeda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-UK\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"caption\":\"Jorge Ojeda\"},\"description\":\"Jorge Ojeda is a product specialist in the Faronics Latam team in Canada.Jorge has a master's degree in cybersecurity and his friends think that he is a MasterChef cooking Chilean empanadas. In his free time he loves to walk and take photos in beautiful Vancouver.\",\"sameAs\":[\"https:\\\/\\\/www.faronics.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU - Faronics","description":"What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services? The","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","og_locale":"en_US","og_type":"article","og_title":"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU","og_description":"What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services? The","og_url":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","og_site_name":"Faronics","article_publisher":"https:\/\/www.facebook.com\/faronics","article_published_time":"2022-03-29T02:39:24+00:00","article_modified_time":"2025-02-12T10:20:43+00:00","og_image":[{"width":1999,"height":1332,"url":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","type":"image\/jpeg"}],"author":"Jorge Ojeda","twitter_card":"summary_large_image","twitter_creator":"@faronics","twitter_site":"@faronics","twitter_misc":{"Written by":"Jorge Ojeda","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#article","isPartOf":{"@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"author":{"name":"Jorge Ojeda","@id":"https:\/\/www.faronics.com\/en-uk#\/schema\/person\/1f33a5b8117ed728b756afd49eefd85c"},"headline":"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU","datePublished":"2022-03-29T02:39:24+00:00","dateModified":"2025-02-12T10:20:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"wordCount":435,"commentCount":0,"publisher":{"@id":"https:\/\/www.faronics.com\/en-uk#organization"},"image":{"@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","inLanguage":"en-UK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","url":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","name":"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU - Faronics","isPartOf":{"@id":"https:\/\/www.faronics.com\/en-uk#website"},"primaryImageOfPage":{"@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"image":{"@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","datePublished":"2022-03-29T02:39:24+00:00","dateModified":"2025-02-12T10:20:43+00:00","description":"What would happen if a hacker breaks into your systems, alters or steals your information, or leaves your users without access to essential services? The","breadcrumb":{"@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb"},"inLanguage":"en-UK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"]}]},{"@type":"ImageObject","inLanguage":"en-UK","@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage","url":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","contentUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","width":1999,"height":1332,"caption":"Update Software Computer Program Upgrade Business technology Internet Concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.faronics.com\/en-uk\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.faronics.com\/en-uk"},{"@type":"ListItem","position":2,"name":"CYBER-ATTACKS, VULNERABILITIES AND HOW PATCH MANAGEMENT CAN HELP YOU","item":"https:\/\/www.faronics.com\/en-uk\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/"}]},{"@type":"WebSite","@id":"https:\/\/www.faronics.com\/en-uk#website","url":"https:\/\/www.faronics.com\/en-uk","name":"Faronics","description":"Simplifying Computer Management","publisher":{"@id":"https:\/\/www.faronics.com\/en-uk#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faronics.com\/en-uk?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-UK"},{"@type":"Organization","@id":"https:\/\/www.faronics.com\/en-uk#organization","name":"Faronics","url":"https:\/\/www.faronics.com\/en-uk","logo":{"@type":"ImageObject","inLanguage":"en-UK","@id":"https:\/\/www.faronics.com\/en-uk#\/schema\/logo\/image\/","url":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","contentUrl":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","width":155,"height":44,"caption":"Faronics"},"image":{"@id":"https:\/\/www.faronics.com\/en-uk#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/faronics","https:\/\/x.com\/faronics"]},{"@type":"Person","@id":"https:\/\/www.faronics.com\/en-uk#\/schema\/person\/1f33a5b8117ed728b756afd49eefd85c","name":"Jorge Ojeda","image":{"@type":"ImageObject","inLanguage":"en-UK","@id":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","url":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","contentUrl":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","caption":"Jorge Ojeda"},"description":"Jorge Ojeda is a product specialist in the Faronics Latam team in Canada.Jorge has a master's degree in cybersecurity and his friends think that he is a MasterChef cooking Chilean empanadas. In his free time he loves to walk and take photos in beautiful Vancouver.","sameAs":["https:\/\/www.faronics.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/posts\/237575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/comments?post=237575"}],"version-history":[{"count":3,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/posts\/237575\/revisions"}],"predecessor-version":[{"id":267127,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/posts\/237575\/revisions\/267127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/media\/237594"}],"wp:attachment":[{"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/media?parent=237575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/categories?post=237575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.faronics.com\/en-uk\/wp-json\/wp\/v2\/tags?post=237575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}