Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 28 May, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Top Tips for managing Microsoft’s Patch Tuesday – August 2016

by The Gurus
August 9, 2016
in News, This Week's Gurus
Share on FacebookShare on Twitter

This year we have seen an average of ten updates a month from Microsoft alone.  Team this with Adobe having one to two bulletins a month and a number of subsequent updates from third parties including Oracle, Google, and Apple, there hasn’t been a month so far in 2016 where you have less than 14 bulletins to test and update!
In anticipation of the law of averages holding true, I have prepared the following quick tips to aid you through these bulletins:

  1. Not all patches are created equally and vendor severity isn’t always the best way to prioritise what order you should emphasise testing. So here is a high level criterion for further vetting a bulletin:
  • Metasploit – Exploit proof of concept within Metasploit (software to aid penetration testing) – If someone is teaching the bad guys how to use the exploit, get it patched first!
  • Zero Day – It is critical to identify any exploits that have been detected in the wild before the vendor releases an update, as this should be a top priority.
  • Public Disclosure – You must take into consideration when example code or significant information regarding a vulnerability has been exposed to the public, as this gives attackers an advantage.
  • Profiling by CVSS – This is a national vulnerability database designed to help prioritise remediation activities that will help you calculate the severity of vulnerabilities found in your systems.
  1. Apply updates that fit the above criteria quickly! If exploit code is available or a Zero Day has been identified, ‘ASAP’ is your window for opportunity.  Public disclosures and those fitting the CVSS profile give you about two weeks before the first exploits may start to occur.
  • 50% of vulnerabilities exploited occur within 2-4 weeks of an update release.
  • 90% of vulnerabilities exploited occur by 40-60 days of a software update release.
  • The average enterprise can take up to 120 days to deploy vendor updates, so consideration must be placed on the prioritisation of update roll out.
  1. Start with the end user’s systems. Phishing exploits are on the rise and the user is the best target to form a beachhead where an attacker can start a persistent attack on your environment. Therefore, we recommend that your end user machines should be patched in less than 14 days.
  • We recommend weekly patching to keep up with the updates that occur between Patch Tuesdays. Within the LANDESK family we release content nearly every day of every week releasing new updates for over 100 non Microsoft Product Families and Microsoft Products. Enterprises should consider implementation strategies such as these to manage and effectively react to the monthly patch Tuesday update.

Understandably it can prove complex to navigate your organisation through Microsoft’s patch update series, however I cannot emphasise enough its importance for the security and the efficiency of your workforce. Hopefully the above tips can provide some clarity in relation to the bulletins and allow you to effectively manage patching updates in the future.
Chris Goettl is Program Product Manager/Product Owner at LANDESK Software

FacebookTweetLinkedIn
Tags: Adobebulletinlandesklandesk softwarepatch tuesdaypatchingUpdate
ShareTweet
Previous Post

How to win the ‘cyber arms race’

Next Post

Australian census attacked by hackers

Recent News

SnapDragon Monitoring scam advice

Tips to Protect Against Holiday and Airline Scams

May 25, 2023
Access Segmentation & Encryption Management from MyCena

New security model launched to eliminate 95% of cyber breaches

May 25, 2023
KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

KnowBe4 Helps Organisations Battle QR Code Phishing Attacks With New Tool

May 25, 2023
Purple Logo, capitalised letters: SALT.

Salt Security Uncovers API Security Flaws in Expo Framework, Issues have been Remediated

May 24, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information