Software vendors are constantly publishing new patches to fix problems in software that they have sold. It is then up to the users of the software to apply the patches. Otherwise, they risk
leaving themselves open to attack via the backdoors that the vendors failed to spot when building the product in the first place.
Patch management has historically been a nightmare for IT and security teams: 12,174 common
vulnerabilities and exposures (CVEs) were reported last year. The need to test these
patches to ensure that they don't cause other unexpected problems means that there is often a delay in getting systems secured. This leaves a gap that hackers can exploit. According to a new report from IBM and the Ponemon Institute, the average cost of a data breach in 2020 is $3.86
million.
All software has technical vulnerability that bad actors can exploit in countless ways. Therefore, the organizations that maintain these programs must routinely look for and address exploits
before they are discovered by criminals.
Every time a vulnerability is addressed, the software provider releases a patch, which needs to be applied by the organizations that use the program. This must be done promptly, because bad
actors—now alerted to the vulnerability—will be actively looking for organizations that are still exposed to the threat.
Nearly 60 percent of data breaches in the past two years can be traced back to a missing operating system patch or application patch, researchers report. Poor patch management
can be linked to the high costs of downtime and disruption. Both of these resulting factors are magnified in larger organizations and are poised to escalate as businesses rush to support fully
remote staff during this period of remote work.
Getting a handle on patch management is an unending challenge for IT and security teams. It takes the average organization 38 days to patch a vulnerability. Even then, 25 percent of software vulnerabilities remain unpatched for more than a year. Improved patching processes could strengthen enterprise defense against cybercrime but costly downtime and disruptions mean even "fire drill" vulnerabilities don't get patched.
One of the biggest obstacles to frequent patching is that security teams struggle to identify everything that needs to be fixed. When teams are understaffed and struggling with alert fatigue, it can be hard to identify the systems that are yet to be updated, to prioritize remediation, and to apply patches quickly.