Patch Management: 75 percent think it's too time-consuming

Patch Management: 75 percent think it's too time-consuming

Share post

A new Ivanti study on patch management shows: Almost three quarters of IT security professionals consider patches too complex and time-consuming. However, a lack of time and the unclear prioritization of vulnerabilities and patches expose companies to risks of cyber attacks.

Ivanti, the automation platform that discovers, manages, secures and maintains IT assets from the cloud to the edge, today published the results of a study on patching. Accordingly, a majority (71%) of IT and security experts find patching too complex, cumbersome and time-consuming. The corona pandemic is also having an impact on the topic: 57% of those surveyed stated that remote work has increased the complexity and scope of patch management. Not least because of this, patching often takes a back seat to other tasks, as 62% of those surveyed stated.

According to the survey, patches cost (too much) time

But what exactly do security teams spend their time on patching? 53% of respondents said that managing and prioritizing critical vulnerabilities takes up the majority of their time. In second place is providing solutions to failed patches (19%), then testing patches (15%) and finally coordinating with other departments (10%). The challenges IT and security teams face when patching could be why 49% of respondents find their organization's current patch management protocols insufficient to effectively mitigate risk.

Attackers set the pace

IT managers need most of the time for these activities (Image: Ivanti study).

At the same time, the speed at which weak points are used as weapons continues to increase. This is why speed is also an essential factor in defending against attacks. To clarify: It takes an average of 100 to 120 days for companies to roll out an available patch. However, it takes threat actors an average of just 22 days after a vulnerability is published to develop a working exploit, according to an analysis by Rand Corporation.

Johannes Carl, Expert Manager PreSales - UxM & Security at Ivanti, rates the study: “These results come at a time when IT and security teams are confronted with the challenges of the 'Everywhere Workplace': Teams are increasingly distributed - in a whole new dimensions. In this context, ransomware attacks are also increasing, with the corresponding effects on business and politics. Most organizations do not have the visibility or the resources to correlate current threats like ransomware with all of the associated exploited vulnerabilities. The combination of risk-based vulnerability prioritization and automated patch intelligence can reveal vulnerabilities that are actively exploited in connection with ransomware. IT and security teams can seamlessly deploy patches and solve problems that pose a risk to companies. ”The analyst firm Gartner describes risk-based vulnerability management as one of the most important security projects that security and risk management experts will have to prepare for in 2021.

WannaCry targeted unpatched systems

The WannaCry ransomware attack, which encrypted an estimated 200.000 computers in 150 countries, is a prime example of the serious consequences that can occur if patches are not applied in a timely manner. A patch for the vulnerability exploited by the ransomware existed several months before the first attack, but many organizations did not implement it. And even now, four years later, two-thirds of companies still haven't patched their systems. However, organizations around the world are still being hit by WannaCry ransomware attacks; From January to March 2021, the number of organizations affected by WannaCry ransomware increased by 53%. Ivanti interviewed over 500 corporate IT and security professionals in North America and EMEA for the study.

More at Ivanti.de

 


About Ivanti

The strength of unified IT. Ivanti connects IT with security operations in the company in order to better control and secure the digital workplace. We identify IT assets on PCs, mobile devices, virtualized infrastructures or in the data center - regardless of whether they are hidden on-premise or in the cloud. Ivanti improves the provision of IT services and reduces risks in the company on the basis of specialist knowledge and automated processes. By using modern technologies in the warehouse and across the entire supply chain, Ivanti helps companies improve their ability to deliver - without changing the backend systems.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more

Darknet job exchange: Hackers are looking for renegade insiders

The Darknet is not only an exchange for illegal goods, but also a place where hackers look for new accomplices ➡ Read more

Solar energy systems – how safe are they?

A study examined the IT security of solar energy systems. Problems include a lack of encryption during data transfer, standard passwords and insecure firmware updates. trend ➡ Read more