{"id":237608,"date":"2022-03-28T19:39:24","date_gmt":"2022-03-29T02:39:24","guid":{"rendered":"https:\/\/www.faronics.com\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"modified":"2022-04-29T10:07:09","modified_gmt":"2022-04-29T17:07:09","slug":"cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","status":"publish","type":"post","link":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","title":{"rendered":"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528"},"content":{"rendered":"<div>\n<div>\n<p><b><span lang=\"ZH-CN\">\u5982\u679c\u9ed1\u5ba2\u4fb5\u5165\u60a8\u7684\u7cfb\u7edf\uff0c\u4fee\u6539\u6216\u7a83\u53d6\u60a8\u7684\u4fe1\u606f\uff0c\u6216\u8ba9\u60a8\u7684\u7528\u6237\u65e0\u6cd5\u83b7\u5f97\u5fc5\u8981\u7684\u670d\u52a1\uff0c\u4f1a\u5982\u4f55\uff1f<\/span><\/b><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<p><span lang=\"ZH-CN\">\u9274\u4e8e\u4ee5\u4e0b\u4e8b\u5b9e\uff0c\u4e0a\u8ff0\u60c5\u51b5\u53d1\u751f\u7684\u6982\u7387\u4f1a\u5f88\u9ad8\uff1a<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ZH-CN\">\u53bb\u5e74\uff0c\u4e09\u5206\u4e4b\u4e8c\u7684\u516c\u53f8\u906d\u53d7\u5230\u7f51\u7edc\u653b\u51fb<\/span><a href=\"applewebdata:\/\/455F29AA-D413-4EE8-A2CB-2425FB5E7F33#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><span lang=\"ES\"><span>[1]<\/span><\/span><\/sup><\/a><span lang=\"ZH-CN\">\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ZH-CN\">\u4e00\u4e2a\u9ed1\u5ba2\u53ef\u4ee5\u4fb5\u5165<\/span><span lang=\"ES\"> 93% <\/span><span lang=\"ZH-CN\">\u7684\u516c\u53f8<\/span><a href=\"applewebdata:\/\/455F29AA-D413-4EE8-A2CB-2425FB5E7F33#_ftn2\" name=\"_ftnref2\" title=\"\"><sup><span lang=\"ES\"><span>[2]<\/span><\/span><\/sup><\/a><span lang=\"ZH-CN\">\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ZH-CN\">\u76ee\u524d\u5b58\u5728\u8d85\u8fc7<\/span><span lang=\"ES\"> 170,000 <\/span><span lang=\"ZH-CN\">\u4e2a\u6f0f\u6d1e\uff0c\u800c\u4e14\u6bcf\u5e74\u8fd8\u4f1a\u6709\u6240\u589e\u52a0<\/span><a href=\"applewebdata:\/\/455F29AA-D413-4EE8-A2CB-2425FB5E7F33#_ftn3\" name=\"_ftnref3\" title=\"\"><sup><span lang=\"ES\"><span>[3]<\/span><\/span><\/sup><\/a><span lang=\"ZH-CN\">\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<div><\/div>\n<\/div>\n<\/div>\n<div>\n<div>\n<div>\n<h4 style=\"text-align: center;\"><span lang=\"ES\">&#8221; \u8865\u4e01\u7ba1\u7406\u4e0d\u4ec5\u4ec5\u662f\u4fee\u590d\u6f0f\u6d1e\uff0c\u6216\u63d0\u9ad8\u53ef\u7528\u6027\u6216\u6027\u80fd\uff1b\u5b83\u8fd8\u53ef\u4ee5\u89e3\u51b3\u5df2\u77e5\u7684\u5b89\u5168\u6f0f\u6d1e\u3002&#8221;<\/span><span lang=\"ES\"><\/span><\/h4>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><\/sup><\/a><\/p>\n<div>\n<p><b><span lang=\"ZH-CN\">\u5982\u4f55\u81ea\u6211\u4fdd\u62a4\uff1f<\/span><span lang=\"ES\"><\/span><\/b><\/p>\n<\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><\/sup><\/a><\/p>\n<div>\n<p><span lang=\"ZH-CN\">\u4e3a\u4fdd\u62a4\u7cfb\u7edf\uff0c\u60a8\u9700\u8981\u91c7\u7528\u4e00\u79cd\u6df1\u5ea6\u9632\u5fa1\u6216\u591a\u91cd\u9632\u5fa1\u7b56\u7565\uff0c\u5176\u4e2d\u5305\u62ec\u5b89\u5168\u4f53\u7cfb\u7ed3\u6784\u8bbe\u8ba1\u3001\u98ce\u9669\u7ba1\u7406\u3001\u4e1a\u52a1\u6301\u7eed\u8ba1\u5212\u4ee5\u53ca\u4e8b\u4ef6\u76d1\u63a7\u548c\u54cd\u5e94\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><\/sup><\/a><\/p>\n<div>\n<p><span lang=\"ZH-CN\">\u8865\u4e01\u7ba1\u7406\u662f\u6700\u91cd\u8981\u4e14\u6700\u6709\u6548\u7684\u5b89\u5168\u5bf9\u7b56\u4e4b\u4e00\uff0c\u53ef\u7528\u4e8e\u6d88\u9664\u7cfb\u7edf\u4e2d\u5b58\u5728\u7684\u6f0f\u6d1e\u3002<\/span><\/p>\n<\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><\/sup><\/a><\/p>\n<div>\n<p><b><span lang=\"ZH-CN\">\u6f0f\u6d1e\u548c\u8865\u4e01<\/span><span lang=\"ES\"><\/span><\/b><\/p>\n<\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup><\/sup><\/a><\/p>\n<div>\n<p><span lang=\"ZH-CN\">\u5229\u7528\u7cfb\u7edf\u6f0f\u6d1e\u53d1\u8d77\u7684\u7f51\u7edc\u653b\u51fb\u4f1a\u5bf9\u8fd9\u4e9b\u7cfb\u7edf\u6240\u5904\u7406\u4fe1\u606f\u7684\u5b8c\u6574\u6027\u3001\u53ef\u5f97\u6027\u548c\u673a\u5bc6\u6027\u9020\u6210\u91cd\u5927\u5f71\u54cd\u3002\u52a0\u62ff\u5927\u7f51\u7edc\u5b89\u5168\u4e2d\u5fc3<\/span><span lang=\"ES\"> (CCCS) <\/span><span lang=\"ZH-CN\">\u8868\u793a\uff0c\u4e3a\u64cd\u4f5c\u7cfb\u7edf\u548c\u5e94\u7528\u7a0b\u5e8f\u5b89\u88c5\u8865\u4e01\uff0c\u662f\u7ec4\u7ec7\u53ef\u4ee5\u91c7\u53d6\u7684\u7b2c\u4e8c\u5927\u91cd\u8981<\/span><span lang=\"ES\"> IT <\/span><span lang=\"ZH-CN\">\u5b89\u5168\u63aa\u65bd\uff0c\u53ef\u6700\u5927\u9650\u5ea6\u51cf\u5c11\u7f51\u7edc\u5165\u4fb5\u53ca\u5176\u5f71\u54cd\u3002<\/span><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><sup>[4]<\/sup><\/a><\/p>\n<\/div>\n<\/div>\n<div>\n<div>\n<div>\n<p><span lang=\"ZH-CN\">\u8865\u4e01\u7ba1\u7406\u8fc7\u7a0b\u5206\u4e3a<\/span><span lang=\"ES\"> 4 <\/span><span lang=\"ZH-CN\">\u4e2a\u6b65\u9aa4\uff1a<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"624\">\n<tbody>\n<tr>\n<td width=\"200\" valign=\"top\"><a href=\"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-6\" rel=\"attachment wp-att-237576\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-8.png\" alt=\"\" width=\"282\" height=\"282\" class=\"aligncenter size-full wp-image-237577\" \/><\/a><\/td>\n<td width=\"424\" valign=\"top\">\n<div>\n<p><b><span lang=\"ES\">1) <\/span><\/b><b><span lang=\"ZH-CN\">\u786e\u5b9a\u8865\u4e01\uff1a<\/span><\/b><span lang=\"ZH-CN\">\u786e\u4fdd\u4f7f\u7528\u4e86\u6700\u65b0\u8865\u4e01<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">2) <\/span><\/b><b><span lang=\"ZH-CN\">\u6d4b\u8bd5\u8865\u4e01\uff1a<\/span><\/b><span lang=\"ZH-CN\">\u5e94\u7528\u8865\u4e01\u4e4b\u524d\uff0c\u5148\u8fdb\u884c\u6d4b\u8bd5\uff0c\u786e\u5b9a\u5b83\u4e0e\u73b0\u6709\u8f6f\u4ef6\u548c\u73af\u5883\u517c\u5bb9\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">3) <\/span><\/b><b><span lang=\"ZH-CN\">\u901a\u77e5\u53d7\u5f71\u54cd\u90e8\u95e8<\/span><span lang=\"ES\"><\/span><\/b><\/p>\n<\/div>\n<div><b><span lang=\"ES\">4) <\/span><span lang=\"ZH-CN\">\u5b89\u88c5\u8865\u4e01\uff1a<\/span><\/b><\/div>\n<div><span lang=\"ZH-CN\">\u5e94\u5c3d\u5feb\u5e94\u7528\u5b89\u5168\u8865\u4e01\uff0c\u4ee5\u786e\u4fdd\u8bbe\u5907\u5b89\u5168\u3002\u4e3a\u907f\u514d\u6253\u65ad\u5de5\u4f5c\uff0c\u53ef\u5728\u975e\u5de5\u4f5c\u65f6\u95f4\u5b89\u6392\u66f4\u65b0\u548c\u8865\u4e01\u4e8b\u5b9c\u3002<\/span><\/div>\n<div><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<p><b><span lang=\"ES\">\u00a0<\/span><\/b><\/p>\n<\/div>\n<div>\n<div>\n<p><b><span lang=\"ZH-CN\">\u6709\u5173\u8865\u4e01\u7ba1\u7406\u7684\u826f\u597d\u5b9e\u8df5\u548c\u5efa\u8bae<\/span><span lang=\"ES\"><\/span><\/b><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ZH-CN\">\u5982\u679c\u6f0f\u6d1e\u5c1a\u672a\u88ab\u5229\u7528\uff0c\u5e94\u4ed4\u7ec6\u6743\u8861\u4e0d\u5b89\u88c5\u8865\u4e01\u7684\u5b89\u5168\u98ce\u9669\u548c\u4e0d\u5148\u8fdb\u884c\u7cfb\u5217\u6d4b\u8bd5\u800c\u76f4\u63a5\u5b89\u88c5\u8865\u4e01\u7684\u64cd\u4f5c\u98ce\u9669\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ZH-CN\">\u5fc5\u987b\u786e\u4fdd\u7528\u6237\u4e0d\u80fd\u505c\u7528\u8865\u4e01\uff0c\u7279\u522b\u662f\u5173\u952e\u8865\u4e01\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ZH-CN\">\u8f6f\u4ef6\u6e05\u5355\u5e94\u540c\u65f6\u5305\u62ec\u6240\u5b89\u88c5\u7684\u8f6f\u4ef6\u548c\u8f6f\u4ef6\u7248\u672c\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ZH-CN\">\u5fc5\u987b\u6743\u8861\u60a8\u7684\u5b89\u5168\u6027\u9700\u6c42\u4e0e\u8f6f\u4ef6\u53ef\u7528\u6027\u548c\u53ef\u5f97\u6027\u9700\u6c42\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<div>\n<p><span lang=\"ES\">\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><span lang=\"ZH-CN\">\u5fc5\u987b\u786e\u4fdd\u8865\u4e01\u7ba1\u7406\u6548\u7387\u9ad8\uff0c\u4ece\u800c\u907f\u514d\u4efb\u52a1\u8fc7\u8f7d\u7684\u60c5\u51b5\u3002<\/span><span lang=\"ES\"><\/span><\/p>\n<\/div>\n<\/div>\n<div>\n<p><a href=\"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-7\" rel=\"attachment wp-att-237584\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-9.png\" alt=\"\" width=\"400\" height=\"242\" class=\"aligncenter wp-image-237585\" \/><\/a><\/p>\n<\/div>\n<div><\/div>\n<div>\n<p><span>\u8981\u4e86\u89e3\u66f4\u591a\u4fe1\u606f\uff0c<\/span><a href=\"https:\/\/www.youtube.com\/watch?v=nekxxBdpzqM\">\u8bf7\u89c2\u770b\u6211\u4eec\u5728 Youtube \u4e0a\u53d1\u5e03\u7684\u7f51\u7edc\u7814\u8ba8\u4f1a<\/a><span>\u3002<\/span><\/p>\n<\/div>\n<\/div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div id=\"ftn1\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref1\" name=\"_ftn1\" title=\"\"><sup><span lang=\"ES\"><span>[1]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/safeatlast.co\/blog\/cybercrime-statistics\/<\/span><\/p>\n<\/div>\n<div id=\"ftn2\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref2\" name=\"_ftn2\" title=\"\"><sup><span lang=\"ES\"><span>[2]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/www.ptsecurity.com\/ww-en\/analytics\/external-pentests-results-2020\/<\/span><\/p>\n<\/div>\n<div id=\"ftn3\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref3\" name=\"_ftn3\" title=\"\"><sup><span lang=\"ES\"><span>[3]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/www.cvedetails.com\/browse-by-date.php<\/span><\/p>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftnref1\" name=\"_ftn1\" title=\"\"><sup><span lang=\"ES\"><span>[4]<\/span><\/span><\/sup><\/a><span lang=\"ES\"> https:\/\/cyber.gc.ca\/en\/guidance\/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<div>\n<div>\n<p>\u5982\u679c\u9ed1\u5ba2\u4fb5\u5165\u60a8\u7684\u7cfb\u7edf\uff0c\u4fee\u6539\u6216\u7a83\u53d6\u60a8\u7684\u4fe1\u606f\uff0c\u6216\u8ba9\u60a8\u7684\u7528\u6237\u65e0\u6cd5\u83b7\u5f97\u5fc5\u8981\u7684\u670d\u52a1\uff0c\u4f1a\u5982\u4f55\uff1f<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<p>\u9274\u4e8e\u4ee5\u4e0b\u4e8b\u5b9e\uff0c\u4e0a\u8ff0\u60c5\u51b5\u53d1\u751f\u7684\u6982\u7387\u4f1a\u5f88\u9ad8\uff1a<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u53bb\u5e74\uff0c\u4e09\u5206\u4e4b\u4e8c\u7684\u516c\u53f8\u906d\u53d7\u5230\u7f51\u7edc\u653b\u51fb<a href=\"applewebdata:\/\/455F29AA-D413-4EE8-A2CB-2425FB5E7F33#_ftn1\" name=\"_ftnref1\" title=\"\">[1]<\/a>\u3002<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u4e00\u4e2a\u9ed1\u5ba2\u53ef\u4ee5\u4fb5\u5165 93% \u7684\u516c\u53f8<a href=\"applewebdata:\/\/455F29AA-D413-4EE8-A2CB-2425FB5E7F33#_ftn2\" name=\"_ftnref2\" title=\"\">[2]<\/a>\u3002<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u76ee\u524d\u5b58\u5728\u8d85\u8fc7 170,000 \u4e2a\u6f0f\u6d1e\uff0c\u800c\u4e14\u6bcf\u5e74\u8fd8\u4f1a\u6709\u6240\u589e\u52a0<a href=\"applewebdata:\/\/455F29AA-D413-4EE8-A2CB-2425FB5E7F33#_ftn3\" name=\"_ftnref3\" title=\"\">[3]<\/a>\u3002<\/p>\n<\/p><\/div>\n<div>\n<div><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<div> &#8221; \u8865\u4e01\u7ba1\u7406\u4e0d\u4ec5\u4ec5\u662f\u4fee\u590d\u6f0f\u6d1e\uff0c\u6216\u63d0\u9ad8\u53ef\u7528\u6027\u6216\u6027\u80fd\uff1b\u5b83\u8fd8\u53ef\u4ee5\u89e3\u51b3\u5df2\u77e5\u7684\u5b89\u5168\u6f0f\u6d1e\u3002&#8221; <\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><\/a><\/p>\n<div>\n<p>\u5982\u4f55\u81ea\u6211\u4fdd\u62a4\uff1f<\/p>\n<\/p><\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><\/a><\/p>\n<div>\n<p>\u4e3a\u4fdd\u62a4\u7cfb\u7edf\uff0c\u60a8\u9700\u8981\u91c7\u7528\u4e00\u79cd\u6df1\u5ea6\u9632\u5fa1\u6216\u591a\u91cd\u9632\u5fa1\u7b56\u7565\uff0c\u5176\u4e2d\u5305\u62ec\u5b89\u5168\u4f53\u7cfb\u7ed3\u6784\u8bbe\u8ba1\u3001\u98ce\u9669\u7ba1\u7406\u3001\u4e1a\u52a1\u6301\u7eed\u8ba1\u5212\u4ee5\u53ca\u4e8b\u4ef6\u76d1\u63a7\u548c\u54cd\u5e94\u3002<\/p>\n<\/p><\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><\/a><\/p>\n<div>\n<p>\u8865\u4e01\u7ba1\u7406\u662f\u6700\u91cd\u8981\u4e14\u6700\u6709\u6548\u7684\u5b89\u5168\u5bf9\u7b56\u4e4b\u4e00\uff0c\u53ef\u7528\u4e8e\u6d88\u9664\u7cfb\u7edf\u4e2d\u5b58\u5728\u7684\u6f0f\u6d1e\u3002<\/p>\n<\/p><\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><\/a><\/p>\n<div>\n<p>\u6f0f\u6d1e\u548c\u8865\u4e01<\/p>\n<\/p><\/div>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\"><\/a><\/p>\n<div>\n<p>\u5229\u7528\u7cfb\u7edf\u6f0f\u6d1e\u53d1\u8d77\u7684\u7f51\u7edc\u653b\u51fb\u4f1a\u5bf9\u8fd9\u4e9b\u7cfb\u7edf\u6240\u5904\u7406\u4fe1\u606f\u7684\u5b8c\u6574\u6027\u3001\u53ef\u5f97\u6027\u548c\u673a\u5bc6\u6027\u9020\u6210\u91cd\u5927\u5f71\u54cd\u3002\u52a0\u62ff\u5927\u7f51\u7edc\u5b89\u5168\u4e2d\u5fc3 (CCCS) \u8868\u793a\uff0c\u4e3a\u64cd\u4f5c\u7cfb\u7edf\u548c\u5e94\u7528\u7a0b\u5e8f\u5b89\u88c5\u8865\u4e01\uff0c\u662f\u7ec4\u7ec7\u53ef\u4ee5\u91c7\u53d6\u7684\u7b2c\u4e8c\u5927\u91cd\u8981 IT \u5b89\u5168\u63aa\u65bd\uff0c\u53ef\u6700\u5927\u9650\u5ea6\u51cf\u5c11\u7f51\u7edc\u5165\u4fb5\u53ca\u5176\u5f71\u54cd\u3002<a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftn1\" name=\"_ftnref1\" title=\"\">[4]<\/a><\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<div>\n<div>\n<p>\u8865\u4e01\u7ba1\u7406\u8fc7\u7a0b\u5206\u4e3a 4 \u4e2a\u6b65\u9aa4\uff1a<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div> <a href=\"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-6\" rel=\"attachment wp-att-237576\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-8.png\" alt=\"\" width=\"282\" height=\"282\" class=\"aligncenter size-full wp-image-237577\" \/><\/a> <\/p>\n<div>\n<p>1) \u786e\u5b9a\u8865\u4e01\uff1a\u786e\u4fdd\u4f7f\u7528\u4e86\u6700\u65b0\u8865\u4e01<\/p>\n<\/p><\/div>\n<div>\n<p>2) \u6d4b\u8bd5\u8865\u4e01\uff1a\u5e94\u7528\u8865\u4e01\u4e4b\u524d\uff0c\u5148\u8fdb\u884c\u6d4b\u8bd5\uff0c\u786e\u5b9a\u5b83\u4e0e\u73b0\u6709\u8f6f\u4ef6\u548c\u73af\u5883\u517c\u5bb9\u3002<\/p>\n<\/p><\/div>\n<div>\n<p>3) \u901a\u77e5\u53d7\u5f71\u54cd\u90e8\u95e8<\/p>\n<\/p><\/div>\n<div>4) \u5b89\u88c5\u8865\u4e01\uff1a<\/div>\n<div>\u5e94\u5c3d\u5feb\u5e94\u7528\u5b89\u5168\u8865\u4e01\uff0c\u4ee5\u786e\u4fdd\u8bbe\u5907\u5b89\u5168\u3002\u4e3a\u907f\u514d\u6253\u65ad\u5de5\u4f5c\uff0c\u53ef\u5728\u975e\u5de5\u4f5c\u65f6\u95f4\u5b89\u6392\u66f4\u65b0\u548c\u8865\u4e01\u4e8b\u5b9c\u3002<\/div>\n<div><\/div>\n<\/p><\/div>\n<div>\n<p>\u00a0<\/p>\n<\/p><\/div>\n<div>\n<div>\n<p>\u6709\u5173\u8865\u4e01\u7ba1\u7406\u7684\u826f\u597d\u5b9e\u8df5\u548c\u5efa\u8bae<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u5982\u679c\u6f0f\u6d1e\u5c1a\u672a\u88ab\u5229\u7528\uff0c\u5e94\u4ed4\u7ec6\u6743\u8861\u4e0d\u5b89\u88c5\u8865\u4e01\u7684\u5b89\u5168\u98ce\u9669\u548c\u4e0d\u5148\u8fdb\u884c\u7cfb\u5217\u6d4b\u8bd5\u800c\u76f4\u63a5\u5b89\u88c5\u8865\u4e01\u7684\u64cd\u4f5c\u98ce\u9669\u3002<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u5fc5\u987b\u786e\u4fdd\u7528\u6237\u4e0d\u80fd\u505c\u7528\u8865\u4e01\uff0c\u7279\u522b\u662f\u5173\u952e\u8865\u4e01\u3002<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u8f6f\u4ef6\u6e05\u5355\u5e94\u540c\u65f6\u5305\u62ec\u6240\u5b89\u88c5\u7684\u8f6f\u4ef6\u548c\u8f6f\u4ef6\u7248\u672c\u3002<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u5fc5\u987b\u6743\u8861\u60a8\u7684\u5b89\u5168\u6027\u9700\u6c42\u4e0e\u8f6f\u4ef6\u53ef\u7528\u6027\u548c\u53ef\u5f97\u6027\u9700\u6c42\u3002<\/p>\n<\/p><\/div>\n<div>\n<p>\u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u5fc5\u987b\u786e\u4fdd\u8865\u4e01\u7ba1\u7406\u6548\u7387\u9ad8\uff0c\u4ece\u800c\u907f\u514d\u4efb\u52a1\u8fc7\u8f7d\u7684\u60c5\u51b5\u3002<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div>\n<p><a href=\"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\/picture1-7\" rel=\"attachment wp-att-237584\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.faronics.com\/assets\/Picture1-9.png\" alt=\"\" width=\"400\" height=\"242\" class=\"aligncenter wp-image-237585\" \/><\/a><\/p>\n<\/p><\/div>\n<div><\/div>\n<div>\n<p>\u8981\u4e86\u89e3\u66f4\u591a\u4fe1\u606f\uff0c<a href=\"https:\/\/www.youtube.com\/watch?v=nekxxBdpzqM\">\u8bf7\u89c2\u770b\u6211\u4eec\u5728 Youtube \u4e0a\u53d1\u5e03\u7684\u7f51\u7edc\u7814\u8ba8\u4f1a<\/a>\u3002<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<div id=\"ftn1\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref1\" name=\"_ftn1\" title=\"\">[1]<\/a> https:\/\/safeatlast.co\/blog\/cybercrime-statistics\/<\/p>\n<\/p><\/div>\n<div id=\"ftn2\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref2\" name=\"_ftn2\" title=\"\">[2]<\/a> https:\/\/www.ptsecurity.com\/ww-en\/analytics\/external-pentests-results-2020\/<\/p>\n<\/p><\/div>\n<div id=\"ftn3\">\n<p><a href=\"applewebdata:\/\/756579D3-4572-4B70-BE24-BF6587F4F081#_ftnref3\" name=\"_ftn3\" title=\"\">[3]<\/a> https:\/\/www.cvedetails.com\/browse-by-date.php<\/p>\n<p><a href=\"applewebdata:\/\/806822FA-F0A8-47C5-83A8-11B177496D61#_ftnref1\" name=\"_ftn1\" title=\"\">[4]<\/a> https:\/\/cyber.gc.ca\/en\/guidance\/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"author":151,"featured_media":237595,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-237608","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528 - Faronics<\/title>\n<meta name=\"description\" content=\"\u5982\u679c\u9ed1\u5ba2\u4fb5\u5165\u60a8\u7684\u7cfb\u7edf\uff0c\u4fee\u6539\u6216\u7a83\u53d6\u60a8\u7684\u4fe1\u606f\uff0c\u6216\u8ba9\u60a8\u7684\u7528\u6237\u65e0\u6cd5\u83b7\u5f97\u5fc5\u8981\u7684\u670d\u52a1\uff0c\u4f1a\u5982\u4f55\uff1f \u9274\u4e8e\u4ee5\u4e0b\u4e8b\u5b9e\uff0c\u4e0a\u8ff0\u60c5\u51b5\u53d1\u751f\u7684\u6982\u7387\u4f1a\u5f88\u9ad8\uff1a \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u53bb\u5e74\uff0c\u4e09\u5206\u4e4b\u4e8c\u7684\u516c\u53f8\u906d\u53d7\u5230\u7f51\u7edc\u653b\u51fb\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u4e00\u4e2a\u9ed1\u5ba2\u53ef\u4ee5\u4fb5\u5165 93% \u7684\u516c\u53f8\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u76ee\u524d\u5b58\u5728\u8d85\u8fc7 170,000 \u4e2a\u6f0f\u6d1e\uff0c\u800c\u4e14\u6bcf\u5e74\u8fd8\u4f1a\u6709\u6240\u589e\u52a0\u3002 &quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528\" \/>\n<meta property=\"og:description\" content=\"\u5982\u679c\u9ed1\u5ba2\u4fb5\u5165\u60a8\u7684\u7cfb\u7edf\uff0c\u4fee\u6539\u6216\u7a83\u53d6\u60a8\u7684\u4fe1\u606f\uff0c\u6216\u8ba9\u60a8\u7684\u7528\u6237\u65e0\u6cd5\u83b7\u5f97\u5fc5\u8981\u7684\u670d\u52a1\uff0c\u4f1a\u5982\u4f55\uff1f \u9274\u4e8e\u4ee5\u4e0b\u4e8b\u5b9e\uff0c\u4e0a\u8ff0\u60c5\u51b5\u53d1\u751f\u7684\u6982\u7387\u4f1a\u5f88\u9ad8\uff1a \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u53bb\u5e74\uff0c\u4e09\u5206\u4e4b\u4e8c\u7684\u516c\u53f8\u906d\u53d7\u5230\u7f51\u7edc\u653b\u51fb\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u4e00\u4e2a\u9ed1\u5ba2\u53ef\u4ee5\u4fb5\u5165 93% \u7684\u516c\u53f8\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u76ee\u524d\u5b58\u5728\u8d85\u8fc7 170,000 \u4e2a\u6f0f\u6d1e\uff0c\u800c\u4e14\u6bcf\u5e74\u8fd8\u4f1a\u6709\u6240\u589e\u52a0\u3002 &quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\" \/>\n<meta property=\"og:site_name\" content=\"Faronics\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/faronics\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-29T02:39:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-29T17:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1999\" \/>\n\t<meta property=\"og:image:height\" content=\"1332\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jorge Ojeda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@faronics\" \/>\n<meta name=\"twitter:site\" content=\"@faronics\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jorge Ojeda\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"},\"author\":{\"name\":\"Jorge Ojeda\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#\\\/schema\\\/person\\\/1f33a5b8117ed728b756afd49eefd85c\"},\"headline\":\"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528\",\"datePublished\":\"2022-03-29T02:39:24+00:00\",\"dateModified\":\"2022-04-29T17:07:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"},\"wordCount\":30,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\",\"name\":\"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528 - Faronics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"datePublished\":\"2022-03-29T02:39:24+00:00\",\"dateModified\":\"2022-04-29T17:07:09+00:00\",\"description\":\"\u5982\u679c\u9ed1\u5ba2\u4fb5\u5165\u60a8\u7684\u7cfb\u7edf\uff0c\u4fee\u6539\u6216\u7a83\u53d6\u60a8\u7684\u4fe1\u606f\uff0c\u6216\u8ba9\u60a8\u7684\u7528\u6237\u65e0\u6cd5\u83b7\u5f97\u5fc5\u8981\u7684\u670d\u52a1\uff0c\u4f1a\u5982\u4f55\uff1f \u9274\u4e8e\u4ee5\u4e0b\u4e8b\u5b9e\uff0c\u4e0a\u8ff0\u60c5\u51b5\u53d1\u751f\u7684\u6982\u7387\u4f1a\u5f88\u9ad8\uff1a \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u53bb\u5e74\uff0c\u4e09\u5206\u4e4b\u4e8c\u7684\u516c\u53f8\u906d\u53d7\u5230\u7f51\u7edc\u653b\u51fb\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u4e00\u4e2a\u9ed1\u5ba2\u53ef\u4ee5\u4fb5\u5165 93% \u7684\u516c\u53f8\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u76ee\u524d\u5b58\u5728\u8d85\u8fc7 170,000 \u4e2a\u6f0f\u6d1e\uff0c\u800c\u4e14\u6bcf\u5e74\u8fd8\u4f1a\u6709\u6240\u589e\u52a0\u3002 \\\"\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/faronics-patch-management.jpg\",\"width\":1999,\"height\":1332,\"caption\":\"Update Software Computer Program Upgrade Business technology Internet Concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/news\\\/blog\\\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528\",\"item\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\\\/%e7%bd%91%e7%bb%9c%e6%94%bb%e5%87%bb%e3%80%81%e6%bc%8f%e6%b4%9e%e4%b8%8e%e8%a1%a5%e4%b8%81%e7%ae%a1%e7%90%86%e7%9a%84%e4%bd%9c%e7%94%a8\\\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#website\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\",\"name\":\"Faronics\",\"description\":\"Deep Freeze \u548c\u5176\u4ed6\u5206\u5c42\u5b89\u5168\u9632\u62a4\u89e3\u51b3\u65b9\u6848\u7684\u51fa\u751f\u5730\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#organization\",\"name\":\"Faronics\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/footer-faronics-logo.png\",\"width\":155,\"height\":44,\"caption\":\"Faronics\"},\"image\":{\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/faronics\",\"https:\\\/\\\/x.com\\\/faronics\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/zh-hans#\\\/schema\\\/person\\\/1f33a5b8117ed728b756afd49eefd85c\",\"name\":\"Jorge Ojeda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"url\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"contentUrl\":\"https:\\\/\\\/www.faronics.com\\\/assets\\\/JorgeOjeda.png\",\"caption\":\"Jorge Ojeda\"},\"description\":\"Jorge Ojeda is a product specialist in the Faronics Latam team in Canada.Jorge has a master's degree in cybersecurity and his friends think that he is a MasterChef cooking Chilean empanadas. In his free time he loves to walk and take photos in beautiful Vancouver.\",\"sameAs\":[\"https:\\\/\\\/www.faronics.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528 - Faronics","description":"\u5982\u679c\u9ed1\u5ba2\u4fb5\u5165\u60a8\u7684\u7cfb\u7edf\uff0c\u4fee\u6539\u6216\u7a83\u53d6\u60a8\u7684\u4fe1\u606f\uff0c\u6216\u8ba9\u60a8\u7684\u7528\u6237\u65e0\u6cd5\u83b7\u5f97\u5fc5\u8981\u7684\u670d\u52a1\uff0c\u4f1a\u5982\u4f55\uff1f \u9274\u4e8e\u4ee5\u4e0b\u4e8b\u5b9e\uff0c\u4e0a\u8ff0\u60c5\u51b5\u53d1\u751f\u7684\u6982\u7387\u4f1a\u5f88\u9ad8\uff1a \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u53bb\u5e74\uff0c\u4e09\u5206\u4e4b\u4e8c\u7684\u516c\u53f8\u906d\u53d7\u5230\u7f51\u7edc\u653b\u51fb\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u4e00\u4e2a\u9ed1\u5ba2\u53ef\u4ee5\u4fb5\u5165 93% \u7684\u516c\u53f8\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u76ee\u524d\u5b58\u5728\u8d85\u8fc7 170,000 \u4e2a\u6f0f\u6d1e\uff0c\u800c\u4e14\u6bcf\u5e74\u8fd8\u4f1a\u6709\u6240\u589e\u52a0\u3002 \"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","og_locale":"zh_CN","og_type":"article","og_title":"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528","og_description":"\u5982\u679c\u9ed1\u5ba2\u4fb5\u5165\u60a8\u7684\u7cfb\u7edf\uff0c\u4fee\u6539\u6216\u7a83\u53d6\u60a8\u7684\u4fe1\u606f\uff0c\u6216\u8ba9\u60a8\u7684\u7528\u6237\u65e0\u6cd5\u83b7\u5f97\u5fc5\u8981\u7684\u670d\u52a1\uff0c\u4f1a\u5982\u4f55\uff1f \u9274\u4e8e\u4ee5\u4e0b\u4e8b\u5b9e\uff0c\u4e0a\u8ff0\u60c5\u51b5\u53d1\u751f\u7684\u6982\u7387\u4f1a\u5f88\u9ad8\uff1a \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u53bb\u5e74\uff0c\u4e09\u5206\u4e4b\u4e8c\u7684\u516c\u53f8\u906d\u53d7\u5230\u7f51\u7edc\u653b\u51fb\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u4e00\u4e2a\u9ed1\u5ba2\u53ef\u4ee5\u4fb5\u5165 93% \u7684\u516c\u53f8\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u76ee\u524d\u5b58\u5728\u8d85\u8fc7 170,000 \u4e2a\u6f0f\u6d1e\uff0c\u800c\u4e14\u6bcf\u5e74\u8fd8\u4f1a\u6709\u6240\u589e\u52a0\u3002 \"","og_url":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","og_site_name":"Faronics","article_publisher":"https:\/\/www.facebook.com\/faronics","article_published_time":"2022-03-29T02:39:24+00:00","article_modified_time":"2022-04-29T17:07:09+00:00","og_image":[{"width":1999,"height":1332,"url":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","type":"image\/jpeg"}],"author":"Jorge Ojeda","twitter_card":"summary_large_image","twitter_creator":"@faronics","twitter_site":"@faronics","twitter_misc":{"\u4f5c\u8005":"Jorge Ojeda","\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"1 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#article","isPartOf":{"@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"author":{"name":"Jorge Ojeda","@id":"https:\/\/www.faronics.com\/zh-hans#\/schema\/person\/1f33a5b8117ed728b756afd49eefd85c"},"headline":"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528","datePublished":"2022-03-29T02:39:24+00:00","dateModified":"2022-04-29T17:07:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"},"wordCount":30,"commentCount":0,"publisher":{"@id":"https:\/\/www.faronics.com\/zh-hans#organization"},"image":{"@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","inLanguage":"zh-Hans","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","url":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you","name":"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528 - Faronics","isPartOf":{"@id":"https:\/\/www.faronics.com\/zh-hans#website"},"primaryImageOfPage":{"@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"image":{"@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage"},"thumbnailUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","datePublished":"2022-03-29T02:39:24+00:00","dateModified":"2022-04-29T17:07:09+00:00","description":"\u5982\u679c\u9ed1\u5ba2\u4fb5\u5165\u60a8\u7684\u7cfb\u7edf\uff0c\u4fee\u6539\u6216\u7a83\u53d6\u60a8\u7684\u4fe1\u606f\uff0c\u6216\u8ba9\u60a8\u7684\u7528\u6237\u65e0\u6cd5\u83b7\u5f97\u5fc5\u8981\u7684\u670d\u52a1\uff0c\u4f1a\u5982\u4f55\uff1f \u9274\u4e8e\u4ee5\u4e0b\u4e8b\u5b9e\uff0c\u4e0a\u8ff0\u60c5\u51b5\u53d1\u751f\u7684\u6982\u7387\u4f1a\u5f88\u9ad8\uff1a \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u53bb\u5e74\uff0c\u4e09\u5206\u4e4b\u4e8c\u7684\u516c\u53f8\u906d\u53d7\u5230\u7f51\u7edc\u653b\u51fb\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u4e00\u4e2a\u9ed1\u5ba2\u53ef\u4ee5\u4fb5\u5165 93% \u7684\u516c\u53f8\u3002 \u25cf\u00a0\u00a0\u00a0\u00a0\u00a0 \u76ee\u524d\u5b58\u5728\u8d85\u8fc7 170,000 \u4e2a\u6f0f\u6d1e\uff0c\u800c\u4e14\u6bcf\u5e74\u8fd8\u4f1a\u6709\u6240\u589e\u52a0\u3002 \"","breadcrumb":{"@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you"]}]},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#primaryimage","url":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","contentUrl":"https:\/\/www.faronics.com\/assets\/faronics-patch-management.jpg","width":1999,"height":1332,"caption":"Update Software Computer Program Upgrade Business technology Internet Concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.faronics.com\/zh-hans\/news\/blog\/cyber-attacks-vulnerabilities-and-how-patch-management-can-help-you#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.faronics.com\/zh-hans"},{"@type":"ListItem","position":2,"name":"\u7f51\u7edc\u653b\u51fb\u3001\u6f0f\u6d1e\u4e0e\u8865\u4e01\u7ba1\u7406\u7684\u4f5c\u7528","item":"https:\/\/www.faronics.com\/zh-hans\/%e7%bd%91%e7%bb%9c%e6%94%bb%e5%87%bb%e3%80%81%e6%bc%8f%e6%b4%9e%e4%b8%8e%e8%a1%a5%e4%b8%81%e7%ae%a1%e7%90%86%e7%9a%84%e4%bd%9c%e7%94%a8\/"}]},{"@type":"WebSite","@id":"https:\/\/www.faronics.com\/zh-hans#website","url":"https:\/\/www.faronics.com\/zh-hans","name":"Faronics","description":"Deep Freeze \u548c\u5176\u4ed6\u5206\u5c42\u5b89\u5168\u9632\u62a4\u89e3\u51b3\u65b9\u6848\u7684\u51fa\u751f\u5730","publisher":{"@id":"https:\/\/www.faronics.com\/zh-hans#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.faronics.com\/zh-hans?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-Hans"},{"@type":"Organization","@id":"https:\/\/www.faronics.com\/zh-hans#organization","name":"Faronics","url":"https:\/\/www.faronics.com\/zh-hans","logo":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.faronics.com\/zh-hans#\/schema\/logo\/image\/","url":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","contentUrl":"https:\/\/www.faronics.com\/assets\/footer-faronics-logo.png","width":155,"height":44,"caption":"Faronics"},"image":{"@id":"https:\/\/www.faronics.com\/zh-hans#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/faronics","https:\/\/x.com\/faronics"]},{"@type":"Person","@id":"https:\/\/www.faronics.com\/zh-hans#\/schema\/person\/1f33a5b8117ed728b756afd49eefd85c","name":"Jorge Ojeda","image":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","url":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","contentUrl":"https:\/\/www.faronics.com\/assets\/JorgeOjeda.png","caption":"Jorge Ojeda"},"description":"Jorge Ojeda is a product specialist in the Faronics Latam team in Canada.Jorge has a master's degree in cybersecurity and his friends think that he is a MasterChef cooking Chilean empanadas. In his free time he loves to walk and take photos in beautiful Vancouver.","sameAs":["https:\/\/www.faronics.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/posts\/237608","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/users\/151"}],"replies":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/comments?post=237608"}],"version-history":[{"count":1,"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/posts\/237608\/revisions"}],"predecessor-version":[{"id":238509,"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/posts\/237608\/revisions\/238509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/media\/237595"}],"wp:attachment":[{"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=237608"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/categories?post=237608"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.faronics.com\/zh-hans\/wp-json\/wp\/v2\/tags?post=237608"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}