5. Update existing applications with known vulnerabilities. Some business applications, especially popular ones, are constantly monitored by third-party information security companies, which increases the chances of eliminating critical security holes in them. But at the same time, the importance of such software for business - even taking into account the unpatched holes - is so significant that companies have to put up with the risk of discovering new, as yet unknown holes. An example of such software is Internet Explorer 6 - many flaws have been found in the browser's defenses over the past ten years, but companies still relied on it to work with basic business applications.
to have to use Java versions with lithuania mobile database disclosed (but not closed) vulnerabilities - they are often required for fixed program launches. Like Java, one of the leaders in terms of the number of vulnerabilities is Adobe Flash - it is required to display graphics and video on websites. Large companies have long since begun to gradually abandon Flash. In some browsers, the platform is disabled by default and the user must activate it manually each time.
According to Graham, who worked at the bank before Qualys, its IT administrators often had to juggle the bank’s systems with potentially insecure software. To mitigate the risks, the bank’s programmers created “virtual patches.” “We had to use outdated software from time to time, but instead of patching it, we turned to creating compensating controls,” he said.
It is not uncommon for companies
-
- Posts: 529
- Joined: Mon Dec 23, 2024 3:13 am