Vulnerability management

Keep your systems protected throughout their lifecycle

Managing vulnerabilities

The majority of cyber security incidents are the result of attackers exploiting publicly disclosed vulnerabilities to gain access to systems and networks. Attackers will, often indiscriminately, seek to exploit vulnerabilities as soon as they have been disclosed. So, it is important (and essential for any systems that are exploitable from the internet) to install security updates as soon as possible to protect your organisation.

Some vulnerabilities may be harder to fix, and a good vulnerability management process will help you understand which ones are most serious and need addressing first.

What are the benefits?

  1. gaining confidence that you are keeping your systems and data protected as new vulnerabilities emerge

  2. having the ability to assess and prioritise vulnerabilities that are not straightforward to fix

  3. reducing the chance of you being a source of onward infection to other organisations you work with

What should you do?

  1. keep your systems updated

  2. develop a vulnerability management process

  3. carefully manage legacy equipment, isolate vulnerable legacy systems that are not able to be updated and prioritise their replacement

Related links