Developing a patch and vulnerability management strategy

By on

In the first two quarters of 2005 more than 3,780 software vulnerabilities were reported, leaving a wide range of system components and software open to exploits. With the popular operating systems often the key target of worm and virus writers, the majority of businesses are left open to attacks.

For example, the August print spooler flaw identified by Microsoft's monthly security update left businesses using the Windows server vulnerable to losing complete control of the infected system, as an exploit would then have free range to view, change or delete data; or create new accounts with ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?