Go Update Your Microsoft Devices Right Now

Category

Vulnerabilities, Cybersecurity Fundamentals

Risk Level

Threat Levels-04.png
 

Microsoft announced some critical updates for their Windows operating systems yesterday on “Patch Tuesday.”  Long story short: get on your Windows computer and install those updates ASAP.

“Back up.  What’s Patch Tuesday?”

Patch Tuesday” is an unofficial term used by the IT industry to reference the second Tuesday in the month when Microsoft regularly releases their updates for all of its myriad of products.  It’s been informally called this since about 2003 and is viewed as a critical day for many IT operators.  Since most organizations rely heavily on Microsoft products, it’s critical that they receive and install the latest updates to continue operating efficiently and securely.

“But why securely?”

We’ve talked about vulnerability management before, but as a refresher, vulnerabilities are holes in your electronic devices’ (e.g. laptops, smartphones, thermostats) code that when left unpatched, can allow hackers to use them to their advantage; like an open back door to your house. Microsoft identifies these vulnerabilities through their own testing, and even through reporting by cybersecurity researchers.  The goal of course is to patch these holes before hackers can discover them and use them.

But remember - it’s a race against time for you.  When Microsoft announces the fix for a vulnerability, it also draws hackers’ attention to the problem.  The hackers will then start working to figure out how to use it maliciously, and take advantage of anyone who hasn’t patched the hole yet.  So you need to apply those updates before the hackers get to you first!

Many organizations try to make sure they apply all their updates as fast as possible, but this doesn’t always go smoothly.  If a computer is turned off, or if someone is working remotely, it may not receive the updates.  As a result, this could put your organization at risk.  If you’re unsure about if your organization is staying on top of its vulnerability management, let’s talk about our Vulnerability Assessment - where we help you know for certain if the backdoor to your house is open to hackers.

 

Follow us - stay ahead.


Read more of the ACT

Previous
Previous

Is the Cloud Actually Secure?

Next
Next

The Latest Email Scam Almost Tricked My Family