IT Gets a Summer Vacation with Light Patch Load for June

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14
Next IT Gets a Summer Vacation with Light Patch Load for June-2 Next

This month, your top priority is the single critical vulnerability, Bulletin 1, which is a cumulative update for all versions of IE. This bulletin accounts for the bulk of the CVEs being fixed this month – 19 of 23. Though this may be very concerning at first glance, the bulletin should not cause undue alarm. In order for the vulnerability to be executed, an attacker would have to craft a malicious site and use a phishing attack to lure an unsuspecting user to the site, which would then compromise the system. An attacker could not get in without some user participation. Many of the successful hacks we’ve seen lately have been through phishing attacks, so remember to take the time to educate your users about security and mitigation.

It’s a record month for Microsoft this month, according to Paul Henry, security and forensic analyst at Lumension. With just five bulletins, June marks the lowest number of bulletins we’ve seen from Microsoft to date this year, making it a light month for IT admins. It’s also the halfway point for the year, which is always a good time to look back at last year and compare. With 50 total bulletins for the year, Microsoft has issued a total of eight more bulletins this year than at the same time last year. Interestingly, the company has issued exactly the same number of critical bulletins so far this year at 16. That means the balance is made up of important bulletins, which are the type of bulletins we prefer to see.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.