ARTICLE
23 October 2023

Cybersecurity Awareness Month: Installing Updates To Fix Bugs And Vulnerabilities

KI
K2 Integrity

Contributor

K2 Integrity is the preeminent risk, compliance, investigations, and monitoring firm built by industry leaders, driven by interdisciplinary teams, and supported by cutting-edge technology to safeguard our clients’ operations, reputations, and economic security. K2 Integrity represents the merger of K2 Intelligence, an industry-leading investigative, compliance, and cyber defense services firm founded in 2009 by Jeremy M. Kroll and Jules B. Kroll, the originator of the modern corporate investigations industry, and Financial Integrity Network (FIN), a premier strategic advisory firm founded by Juan Zarate and Chip Poncy dedicated to helping clients achieve their financial integrity goals.
This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations...
United States Technology
To print this article, all you need is to be registered or login on Mondaq.com.

This article is the third in a series of articles about Cybersecurity Awareness Month. Throughout October, K2 Integrity has been providing tips and solutions to organizations to commemorate the 20-year anniversary of the initiative. This year's focus is on creating strong passwords and using a password manager, enabling multi-factor authentication, updating software, and recognizing and reporting phishing attempts.

This third article highlights the importance of ensuring software is up to date and the role that plays in keeping organizations, their clients, and their employees secure.

Securing Digital Assets by Regularly Installing Updates

Many organizations have implemented authentication-related policies that require long, unique passwords and multi-factor authentication to help prevent unauthorized access to their networks. Organizations can enhance their information security framework by implementing an additional layer to their security controls: a patch management process. This ensures that systems are updated in accordance with vendor recommendations. Not only do such updates provide computers and other devices with the latest features, they also install important security patches. How can organizations ensure that their network and devices are protected with the latest updates?

  • Monitor for update announcements. Organizations should stay informed of upcoming updates to prepare for rollouts. Create a group email to subscribe to automatic messages from software vendors, and schedule regular review sessions to discuss and plan for upcoming updates. If a vendor or provider does not send emails with update details, assign a team member to regularly check their website or communicate with the vendor's account manager.
  • Implement an update protocol. Inconsistent software versions could pose a danger to organizations—cyber criminals can exploit bugs in a single outdated server or laptop to access the network. To confirm that updates are applied consistently throughout the organization, consider implementing an inventory system to track devices and systems. The IT team should manage and enforce roll outs. As part of this process, the team should initially test the update on a small group of users to confirm that the update does not cause issues with the organization's network and apps. After it is confirmed to be compatible, the update can be rolled out to the whole organization.
  • Install all updates as soon as possible. Security updates and patches are released to fix bugs and vulnerabilities in operating systems and devices. After updates are announced, there is a limited amount of time to act before hackers learn how to exploit security issues and bugs. Any delay in installing updates increases risk by leaving a vulnerability unpatched.
  • Enforce updates for mobile devices that connect to the corporate network or access corporate data. Many organizations allow employees to use their personal mobile devices, also known as Bring Your Own Device (BYOD), to check work email and access data. To ensure these devices remain secure, organizations should require employees to regularly update all devices with network access. Mobile device management systems can monitor devices' software versions to help reduce security vulnerabilities. If employees do not install the most current software version on their devices, consider removing their company access until the device has been updated.
  • Educate employees about the dangers of delaying or ignoring device updates. Even if an employee's device does not have direct access to company email and data, a compromised personal device could still pose a danger to an organization. For example, employees may sign into corporate email through the web portal on their mobile phones, thus opening up the organization to compromise. Train employees to set up automatic updates for their devices and all apps to increase the organization's and employee's security, especially prior to traveling.

Software bugs and vulnerabilities can open an organization to malware and unauthorized network access. Implementing multiple layers of security—creating strong passwords, enabling multi-factor authentication, and installing updates—helps keep an organization's network and its confidential information secure.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

We operate a free-to-view policy, asking only that you register in order to read all of our content. Please login or register to view the rest of this article.

ARTICLE
23 October 2023

Cybersecurity Awareness Month: Installing Updates To Fix Bugs And Vulnerabilities

United States Technology

Contributor

K2 Integrity is the preeminent risk, compliance, investigations, and monitoring firm built by industry leaders, driven by interdisciplinary teams, and supported by cutting-edge technology to safeguard our clients’ operations, reputations, and economic security. K2 Integrity represents the merger of K2 Intelligence, an industry-leading investigative, compliance, and cyber defense services firm founded in 2009 by Jeremy M. Kroll and Jules B. Kroll, the originator of the modern corporate investigations industry, and Financial Integrity Network (FIN), a premier strategic advisory firm founded by Juan Zarate and Chip Poncy dedicated to helping clients achieve their financial integrity goals.
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More