• About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consulting Services
    • Cyber Executives
  • News & Resources
    • In the News
    • Blog
    • Resources
  • Contact
Can We Help?
  • About
    • About Us
    • Our Expertise
    • Meet The Team
    • Careers
  • Managed Services
    • Overview
    • Monitoring & Detection
    • Protection
    • Response
    • Training
  • Cyber Assessments
  • Consultancy
    • Consultancy Service
    • Cyber Executives
  • News & Resources
    • In the News
    • Blogs
    • Resources
  • Contact
  • Can We Help?

The Importance Of Patch Management

With more and more cyber attacks every day, and multiple endpoints and devices for organisations to keep track of, it’s never been more important to ensure that they’re updated. Not only do updates help your devices run smoothly and more efficiently, but they can help to patch vulnerabilities before they can be exploited by attackers.

What is patch management?

Patch management is the simple but often forgotten process of managing all the patches and software updates that are distributed within an organisation and its respective infrastructure. This can be done manually, where updates are installed and tracked one by one. Alternatively, it can be done via a selection of solutions provided by vendors, where the distribution and logging of said patches and versions can be almost completely automated depending on the organisation’s needs.

Where is it needed?

As a blanket statement, patch management is required by all organisations if they want to uphold a good security standard. To put it simply, patch management allows an organisation to secure any identified and fixable vulnerabilities, and decrease the organisation’s attack surface. In most cases, if a vulnerability has been discovered and publicly disclosed to the vendor, then a security update or patch should follow shortly after. What organisations need to do is manage the installation and acquisition of patches as soon as possible in order to ensure that their tools and utilities are kept safe - keep in mind, though, that these updates may have an effect on your current services.

The dangers of ignoring patch management

One of the most high-profile vulnerabilities in recent years was Log4Shell,  which helped to show that the stakes for keeping your software patched and up-to-date couldn't be higher. Log4Shell was a zero-day vulnerability in Log4j, the popular logging Java library, and it took the world by storm in late 2021. The exploit allowed attackers to execute code (typically malicious code) on the machines of any victims who had the vulnerable library installed. This caused catastrophic damage and left people panicking over the holiday season - not just because of the incidents that occurred as a result of the vulnerability, but also the widespread media coverage of Log4Shell, which created a frenzy online. This vulnerability has since been mitigated in later versions of Log4j, but if your organisation doesn’t have patch management procedures or solutions in place, then you may still be vulnerable.

Another example of a well-documented vulnerability came to light during the SolarWinds supply chain cyber attack back in 2020. The vulnerability, SUNBURST, was used to attack companies and organisations using SolarWinds’ Orion software, 

 a performance and health monitoring platform for IT devices. By exploiting it, malicious actors were able to gain access to over 30,000 organisations using several versions of the software - 2019.4 Hotfix 5, 2020.2 with no Hotfix installed, and 2020.2 Hotfix 1.

It’s been almost two years since this breach came to light, and security patches have been released for each of these versions. During that time, however, organisations were left panicking, uncertain of their patch management policies. By being proactive and putting policies in place, you can rest easy knowing you have everything in place to help remediate any threats that might arise.

Ways that you can configure patch management

One of the best ways to work out a patch management solution for your business is to focus on the three pillars of People, Processes, and Technology - otherwise known as PPT.

People

When considering ‘People’ as part of your patch management solution, user awareness is key. By keeping up with the latest vulnerabilities and working closely with your cyber security team, you’ll be able to better understand where you should be focusing your attention when it comes to managing the patches and updates.

Processes

The ‘Process’ part of patch management, typically follows this rough structure:

  • Discovery – identify and document your organisation’s IT asset list.
  • Categorisation – group your IT assets by risk and priority.
  • Patch Management Policy – identify the what, when, how and under what conditions the patches will be rolled out to the categorised items. For example, vulnerabilities with a critical CVE (Common Vulnerabilities and Exposures) score should be patched immediately on all public-facing devices, and vulnerabilities with a low CVE score affecting a niche toolset could be patched once a month.
  • Monitoring – ensure monitoring is in place for newly-released vulnerabilities, whether that be through manual or automated means.
  • Test Lab – create an environment that allows for patches to be tested before they’re pushed to the live production environment. Some patches could have unintended and adverse effects and, on some occasions, create zero-day vulnerabilities - putting the business in a worse position than it was prior to installing the patch. It’s important to ensure patches are tested first, to ensure the aforementioned is less likely to happen.
  • Rollout and Documentation – when all parties are happy with the test case, document and configure the rollout of the patches to the agreed devices in the live production environment.
  • Auditing – patches don’t always work on every device first time, so you should ensure there’s a way to identify the devices that fail to update. This is a good point in the process to involve people in helping to identify any patch anomalies.
  • Reporting, Reviewing, and Renewing – document and report all of the actions taken throughout the process, as well as the devices that were updated. Afterwards, review the process to identify any parts of the process where improvements could be made - and then enact them.

Technology

As mentioned above, manual patch management is an option. However, it can be quite cumbersome and resource demanding. Another option is to look at automation tools, which can be used to assist with patch management. RMM (remote monitoring and management) solutions can help with most aspects of the procedures described above. Some of the best ones out there on the market are N-Able, ConnectWise, ManageEngine, and Microsoft 365 Lighthouse, which can all assist you with patch management and help you to manage and monitor the devices within your network.

Patch management is a crucial part of the operation of any modern organisation, and if ignored, it will leave a large attack surface. Fortunately, it can be automated, allowing for you to control your investment. Furthermore, having this self-sustaining layer of protection helps you to improve your company’s security posture and overall technical cyber culture, allowing you to be proactive to be defended instead of reactive and open. To learn more about how you can shore up your own cyber defences, don’t hesitate to get in touch - the expert team can help

Related articles

Posted on December 16, 2021

CSA Awards of the Year 2021

As we near the end of year, an incredibly busy year for our teams in terms of growth and innovation, we wanted to take a moment to…

Posted on December 14, 2021

Cyber Essentials Changes: Here's Everything You Need To Know

Rapid digital transformation, mass adoption of cloud-based services and migration to home-working were necessary changes for businesses…

Posted on December 8, 2021

CSA 12 Days of Cyber Christmas

As the end of the year fast approaches, we wanted to share a little refresher on ways to ensure your technology and data remains…

Posted on December 1, 2021

Planning To Shop Online This Holiday Season? Here Are The Cybercrimes You Need To Be Aware Of

Black Friday and Christmas are considered a blessing and a curse within the retail industry. It’s a time where retailers…

Posted on October 20, 2021

This Apple “AirTag” Vulnerability could be harvesting your credentials

During late September, the headlines were hit with the news of a vulnerability within Apple’s AirTag…

Posted on October 13, 2021

September Security Roundup

Currently, the world faces not one pandemic but two: Coronavirus and the rise of ransomware attacks…

Posted on October 10, 2021

Is Data More Valuable Than Jewels? The A-List Cyber Heist That’s Putting Ransomware Attacks On The Map

Cybercriminals don’t discriminate. It doesn’t matter how famous you are, if your information is vulnerable…

Posted on October 6, 2021

CSA adds Lookout Mobile Endpoint Security to growing solutions portfolio

Following the global pandemic, the mass migration to remote working was a necessary move…

Posted on September 15, 2021

​​The Rising Popularity of NFTs and The Rising Security Threat

The art world is known for being ahead of the curve, adopting new and interesting technologies to…

Posted on September 7, 2021

TG1021 (Praying Mantis): The new threat actor group that could be targeting your IIS servers!

Recently, an infamous threat actor group going by the name of TG1021 or Praying Mantis…

Posted on August 19, 2021

Is Cyber Training and Education working?

The report from the ICO on the ‘surprising’ decline in personal data breaches…

Posted on August 13, 2021

How did an unknown hacker steal over $600M in cryptocurrencies in the biggest ever crypto based cyber-attack?

On 10th August 2021, Poly Network announced in a tweet that it had been attacked…

Posted on May 12, 2021

How to Prevent a Ransomware Attack

According to a 2020 survey by Sophos, 51% of organisations were hit by Ransomware in the last year…

Posted on March 23, 2021

Is your Microsoft M365 service secure from attackers? Are you sure?

The mass migration to remote working as a result of the coronavirus pandemic has…

Posted on January 10, 2021

Covid-19: How to prepare your staff
for remote working

Since the initial Covid-19 outbreak, the nation’s workforce had to learn to quickly…

Posted on December 13, 2020

Covid-19: Cyber Criminals Launch
Their Own ‘Virus’

Whilst the world is currently preoccupied with public health, cyber attackers have taken…

Posted on November 20, 2020

The rise of Covid-19 phishing scams

Whilst the rollout of the Covid-19 vaccine across the UK brings with it the good news…

About

  • About Us
  • Our Expertise
  • Meet The Team
  • Careers

Managed Services

  • Overview
  • Monitoring & Detection
  • Protection
  • Response
  • Training

Consultancy

  • Consulting Services
  • Cyber Executives

News & Resources

  • In the News
  • Blog
  • Resources

Cyber Assessments

Can We Help?

Partner Portal

Contact

Head Office Unit 11, Wheatstone Court, Waterwells Business Park, GL2 2AQ
©2022 Cyber Security Associates. All Rights Reserved.
Terms of Use Privacy Policy
Powered by P1C
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy.
Cookie settingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT

Can We Help?