How Software Patching Can Prevent The Next Breachpocalypse
While it’s easy to chalk up this Breachpocalypse to the evolving sophistication of cyber criminals, the power of new hacking tools and the difficulty of fighting against an international menace, that doesn’t tell the full story. The real shock behind the numbers is exactly how many breaches could have been prevented with an effective software patching process.
According to the Online Trust Alliance’s Cyber Incident & Breach Trends Report, a stunning 93% of reported breaches were completely avoidable. Regular patching, along with paying close attention to vulnerability reports and training employees to avoid malicious emails, could have saved international businesses and their customers billions of dollars in damage.
Despite the fact that patches are freely available, businesses of all sizes continue to struggle to patch devices across their network not only in the days after a patch is release, but quite often years after. Looking back a few years, the Verizon Data Breach Report 2016 showed that most exploits in 2015 came from vulnerabilities discovered in 2007, while vulnerabilities from as far back as 1999 still accounted for a significant amount of exploits.
No matter which way you measure it, 2017 will be remembered as the Year of the Data Breach. Record highs were hit for almost every type of data breach statistic available:
Total number of breaches in 2017 (44.7% increase from 2016)
Increase in ransomware attacks against business in 2017
Number of personal records exposed in 2017
Breaches that involved hacking (twice as high as in 2014)
Looking at 2017, two of the most notable hacks could have been prevented with an effective patching process:
The WannaCry ransomware campaign wreaked worldwide chaos, causing more than $8 billion in losses across more than 100 countries. The patch for the vulnerability exploited by WannaCry was available 59 days before the attack.
Equifax exposed the data of 143 million people, resulting in an estimated $600 million loss of shareholder value, lost business, remediation costs, and fines, not to mention immeasurable brand value and customer trust. In mid-May Equifax confirmed that attackers gained access to its system through a Apache Struts web-application vulnerability that had a patch available in March.
What keeps a company from promptly patching? Often it’s a combination of prioritization coupled with the difficulty effectively distributing patches across the enterprise. But make no mistake; patching is often the only thing keeping your company secure. The more you can keep your patches up to date, the more likely you’ll be protected against the next WannaCry and less likely you’ll become the next Equifax.
SIX MONTHS UNTIL THE END OF WINDOWS 7 SUPPORT
Don’t let Windows become your next big security risk
Microsoft will end included support for Windows 7 on January 14, 2020, yet almost one-fifth (18%) of large enterprises still haven’t completed their migration to Windows 10. Learn what options IT teams have to prepare for the end of Windows 7 and to manage the regular cadence of Windows as a Service updates.
THE CLOCK IS TICKING
Related Blog Posts
Experience a day in the life of Tom and Jerry. Both are communication professionals working for different enterprises. Jerry is all in on video and Microsoft Teams, Tom is not. Microsoft Teams Live Events Scales Communication and Kollective Scales Microsoft Teams Live...read more
Using video broadcasts can significantly improve communication across large enterprises, but it is difficult to get right. There are so many pitfalls, particularly as most companies don’t see video production as a core competency. The challenge for them now is that in...read more
Why has video broadcasting become one of the most vital tools for any large-scale enterprise? It comes down to three key benefits that can boost how a business connects with its own employees: Culture, Engagement and Productivity. An astounding 50% of the global...read more