Before, During and After Patch Tuesday: A Survival Guide

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Before, During and After Patch Tuesday: A Survival Guide-5 Next

Once the patches have been released, it’s time to apply them. Use the information released by the vendors to assess patch impact, asset risk and value to prioritize the patches and your systems for testing and deployment. Consider the threat level, whether there are known active exploits in the wild, the risk of compromising your systems and the consequences if systems are compromised.

Use test groups to test each patch and deploy patches in phases. Stage deployment by system groups and prioritization. Start with the low-risk groups, verify that no problems occur, and then work your way to larger and higher-risk areas of your network. We always recommend you cache all patch content before deployment.

It’s been said that there are only two types of companies left in the world: those who know they’ve been hacked and those who don’t. We have to hope that there’s still a third group: those who have not been hacked. You can be sure those who belong to the third group are those who are rigorously implementing security features and, more importantly, keeping them updated.

Patching is not a highlight of the job, but it is a key – some might even say the key – to mitigating risk to your system and remediating vulnerabilities. Despite its importance, it is easy to let it fall by the wayside. To help make patching easier, Paul Henry, security and forensic analyst at Lumension, has come up with some simple tips to help your Patch Tuesday go by a little smoother and keep your systems up to date.


Related Topics : Network Security, Unified Threat Management

More Slideshows

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Security118-190x128 5 Essential Incident Response Checklists

When a security breach occurs, IT teams that are armed with incident response checklists will be better prepared to execute a fast and effective response. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.