A single hacker could break into more than 90% of companies

Two out of three companies suffered a cyberattack last year, according to a study by Safeatlast. Furthermore, a cybercriminal could break into 93% of companies (PTSecurity, 2020). Currently, there are more than 170,000 vulnerabilities and more are discovered every year (CVE Details, 2022), as cyber-attacks have increased in recent years and are increasingly more sophisticated.

As highlighted by Qualiteasy, importer of Faronics solutions in Spain, cybersecurity is a priority objective of Spanish companies and it has become the issue that most concerns them, with 48% giving it a high or very high rating (Cyberpreparedness Report 2022, Hiscox).

defense in depth strategy

To protect its systems, Faronics experts recommend that the company implement a defense-in-depth or layered strategy that includes the following: secure architecture design, risk management, a business continuity plan and incident monitoring and response. Patch management is one of the most important and effective security measures you can apply to eliminate system vulnerabilities.

Cyber-attacks, which take advantage of system vulnerabilities, can have a major impact on the integrity, availability and confidentiality of the information handled by these systems. According to the Canadian Center for Cyber ​​Security (CCCS), patching operating systems and applications is the second most important cyber security measure a business can take to minimize intrusions and their impact.

Warning, scroll to continue reading

Patch management is a four-stage process: identify, test, notify those affected and install. In the same way, as highlighted by Faronics, there are a series of good practices that must be taken into account in patch management and that is, for example, weighing the security risks of not applying a patch against the operational risks. to apply it without carrying out exhaustive tests beforehand. Another key is to make sure that users can’t disable patches, especially critical ones. Likewise, security needs must be balanced against those of usability and availability. Finally, it is necessary to ensure that patch management is effective to avoid situations of task overload.

Related Articles

Leave a Reply

Your email address will not be published.