iTnews
  • Home
  • News
  • Technology
  • Security

Patch by importance, not popularity

By Greg Masters on Jul 18, 2011 4:00PM
Patch by importance, not popularity

Patching by popularity is risky business.

A patching strategy can reduce vulnerability risks by as much as 80 percent, according to a new study.

But administrators would on average have to be fluent in 14 different update programs to fully patch a system.

Worse, an organisation with 1000 programs that patches all of its Windows components would miss 78 percent of vulnerabilities, the research found, because third-party applications are responsible for 69 percent of flaws on a typical endpoint machine.

The study said attackers had more avenues for exploit because the number of endpoints had risen, and noted that securing the nodes was often difficult because of the large number of programs and plug-ins that operate on them.

Testing patching strategies against a bed of 200 programs by market share and risk of exploit, Security company Secunia said patching the most critical programs remediated 71 percent of total risk, while patching the most popular programs offset just 31 percent of the risk.

A separate report from Avast Software, released on Wednesday, echoes Secunia's findings regarding unpatched systems.

In a poll of users of its anti-virus solution, Avast found that more than 60 percent of those using Adobe Reader were putting their systems at risk of malware attack by running unpatched versions of the program.

One out of every five users was found to be using an unpatched version of Reader that was at least two generations old.

Despite regular patch releases, Adobe's widely used PDF reader has been a popular launch vehicle for miscreant coders, who use the application to embed malware exploits and payloads to take control of an affected system.

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
patchingsecurityupdates

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Greg Masters
Jul 18 2011
4:00PM
0 Comments

Related Articles

  • Researchers find APT campaigns share known vulnerabilities
  • Twitter says zero-day bug leaked account data
  • Android apps are invasive and unsafe: study
  • ACSC and CISA detail top malware of 2021
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Student details, photos exposed in University of WA data breach

Student details, photos exposed in University of WA data breach

Defence, DEWR drop $160m on Microsoft software, Azure

Defence, DEWR drop $160m on Microsoft software, Azure

Digital Nation

Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
COVER STORY: Multiple cloud models make security more complex
COVER STORY: Multiple cloud models make security more complex
COVER STORY: What happens when Google changes its algorithm?
COVER STORY: What happens when Google changes its algorithm?
Case Study: Swinburne University overhauls student management system
Case Study: Swinburne University overhauls student management system
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.