Change/Patch Management??

Change/Patch Management??

In most companies, terms such as Patch Management and Change Management are foreign to the security staff. Sure they read of it in certification books but, the reality of it is that most companies still don't have formal change and patch management policies that are being enforced from the top. With the lack of governance in these areas, companies are much more vulnerable to any threats that are written to target the vulnerabilities that current or even older patches address. Albeit, Yahoo is a tech company (see link for reference), goes to show that even giants lack in these areas where IS/IT Governance may be decentralized.?

The risk is, as an overall statement, the loss of brand equity and financial loss. An patch can indeed address any type of vulnerability, depending on whether it is a O/S level patch or a software level patch. So the best way to describe the risk outside of business speak is as follows:

Lack of Change Management?- The risk of not exercising a formal change management process can lead to disruption in operations or loss of availability (CIA). Ensuring that a formal Change Review Board, with stakeholders present, review the change request, test the change in a test/sandbox environment, and communicate a change window, will guarantee for a successful change.?

Lack of Patch Management?- The risk of not exercising a formal patch management process can lead to the unauthorized disclosure (CIA) or modification (CIA) of company data and can also lead to disruption of operations (CIA). Ensuring that your asset inventory is up-to-date and your organization is utilizing a patch management solution to keep the assets along with the Change Management policy can avert such disasters.?

Thought Provoking Link:

https://www.businessinsider.com/romanian-hackers-allegedly-used-the-shellshock-bug-to-hack-yahoos-servers-2014-10?(Links to an external site.)

要查看或添加评论,请登录

Nick James的更多文章

  • Enabling Real-time Threat Detection in IT Networks

    Enabling Real-time Threat Detection in IT Networks

    In the rapidly evolving world of cybersecurity, organizations face a challenge in detecting threats. Threat detection…

    2 条评论
  • Cyber Sec Considerations in Hyperautomation

    Cyber Sec Considerations in Hyperautomation

    As I promised the audience during the Intelligent Automation Panel on 19 May at the ElevateIT event in Dallas, here are…

  • LinkedIn Cybersecurity & Privacy Tips to Stop Social Engineering

    LinkedIn Cybersecurity & Privacy Tips to Stop Social Engineering

    Of the number of social media sites, LinkedIn is most widely used to carry out social engineering campaigns on…

  • Steps to prevent bad people from getting into your home network / Chromecast

    Steps to prevent bad people from getting into your home network / Chromecast

    1. Access your home router: While joined to your home WiFi, open a browser (e.

  • The Four Pillars of Life

    The Four Pillars of Life

    Recently, the way I have been operating in life aligns into four neat categories as follows: Health & Wellness, Family,…

    1 条评论
  • Securing Your Person

    Securing Your Person

    SSIDs are not regulated, you don't have to have a unique name/number like domains or Public IP's nor do they have to be…

社区洞察

其他会员也浏览了