Patching-There is No One Size Fits All

Patching-There is No One Size Fits All

Each IT environment is unique.

Each company, organization or government entity has different

Applications

Hardware

Security Compliance Requirements

User Needs

Due to this fact there is no one patching schema that fits all organizations. Patching comes with certain risk and therefore patching recommendations cannot be totally left to the vendors to manage. Due to the interconnectedness of applications, an update patch to one application can change the way it interacts with other applications and can cause the overall IT infrastructure to not operate properly. In addition, the patching may cause security concerns.

The patches that get applied need to be necessary patches to ensure the continued operation of the network and cause minimal impact to the user environment. After patches become available the internet becomes a buzz with the affect that the patches have had on the program being patched as well as programs that that program may interact with. Based off of this information you can determine if you wish to apply certain patches or if you can get by with skipping some as they will affect either the user environment or other applications.

In the end you must me the master of your patching destiny or you must hire a group that can help you administer your change control plan. You cannot rely on the software vendors recommendations only. If you want to keep your user environment working well and stay secure, you will have to get informed, stay informed and apply your patches intelligently and with attention to detail.

要查看或添加评论,请登录

Jon Almond的更多文章

  • NIST vs SANS Incident Response

    NIST vs SANS Incident Response

    NIST is an alternative to SANS. Please reference this pdf.

  • What Makes Blockchain Attractive For Application Development

    What Makes Blockchain Attractive For Application Development

    Architecting an Enterprise Blockchain solution is much like the development of custom software or any other enterprise…

  • Security policy makes your security strategy better.

    Security policy makes your security strategy better.

    · Hey Jon! What is a Policy? In a broad sense policy is a “rule” whose intent when combined with other “rules” is to…

  • Zero Tolerance?

    Zero Tolerance?

    IT security policies like any policy within an organization should be written to advance the mission statement of the…

    2 条评论
  • Top 5 Cyber Threats

    Top 5 Cyber Threats

    Thanks to everyone that supported this weeks survey. From your responses I have compiled the below.

  • Securing IP CAMS

    Securing IP CAMS

    Hacking IP cams doesn't take a ton of skill so you should protect yourself today by changing default user name and…

  • Ransomware-How Does it Work?

    Ransomware-How Does it Work?

    How Ransomware Works Ransomware takes advantage of the weaknesses in both the human and technical framework of a…

  • Is DDOS Still a Thing?

    Is DDOS Still a Thing?

    A fifth of attacks are still DOS or DDOS style attacks. There is a high probability that you will be DOS or DDOSed as…

  • The Anatomy of the Scam

    The Anatomy of the Scam

    Have you ever wondered how you build a phishing scam? Recent I had to do exactly that for school, it was a blast. It…

  • How Much Risk Will I Accept

    How Much Risk Will I Accept

    The ultimate goal of a Pen Test is to allow an organization to have a full view of the risk that they are exposed to. A…

社区洞察

其他会员也浏览了