Microsoft’s Christmas Gift to IT: Improvement over 2011

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Previous Next

Click through for a summary of what to expect in December's Patch Tuesday, as identified by Paul Henry, security and forensic analyst at Lumension.

Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

This month, there are seven bulletins, of which five are critical and two are important. Fortunately, none are currently under active attack, so that should set IT’s mind at ease as they begin to apply this set of patches.


Since 2012 is coming to an end, Paul Henry, security and forensic analyst, Lumension pulled together a quick look at the numbers year-over-year. In 2011, Microsoft had 100 bulletins for the calendar year, of which 34 were critical, 63 important and three moderate. In 2012, they reduced the number of bulletins by close to 20 percent, coming in at 83 bulletins for the year, of which 35 were critical, 46 important and two moderate. According to Henry, it’s great to see that Microsoft’s Secure Coding Initiative is paying off, reducing the number of vulnerabilities in their software, resulting in an easier time for IT at Patch Tuesday time.

Another trend that’s interesting to note is Microsoft’s consistency. When you look at the numbers in-depth, you can see that in 2011, there was a bit of yo-yo’ing going on with Patch Tuesday. For example, in January, there were two bulletins, while February had 12. March then went back down to three, but April went up to 17, while May went down to two and June back up to 16. IT might have felt like they had whiplash by the end of the year! In contrast, January of this year had seven, slight increase to nine in February, then six in both March and April, and seven in both May and June. In fact, only one month – September, at three – was lower than six or higher than nine. The degree of consistency makes it easier for IT to plan out the time and effort they’ll need to spend on Patch Tuesday each month.

 

More Slideshows

Security28-290x195 Nine Questions to Ask When Selecting a Security Vendor

You need it. They claim to have it. What questions should you be asking as you hunt for the "just right" vendor to help you defend against the most sophisticated and determined adversaries?  ...  More >>

LogRhythmHeartbleed0x Heartbleed: Eight Tips and Strategies for Keeping Safe

One of the most dangerous IT security threats of all time emerged recently -- a bug called Heartbleed. Here are eight tips for keeping your data safe. ...  More >>

Security27-290x195 Seven Key Components to Start Your Incident Response Plan

Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to current and emerging cyber threats. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.