System Vulnerabilities - New Year, New Attacks
If your organization is like most, systems security is a top priority. Still, with the New Year comes a whole new world of threats. Consider:
- New attack vectors: In the past, most attacks were delivered via e-mail. Now they come from a wider range of sources, including Web sites, removable media (USB drives), public WiFi networks, mobile devices, instant messaging clients and Web 2.0 applications.
- Higher numbers of vulnerabilities: In October 2009, Microsoft alone delivered a record setting 13 separate bulletins for 34 vulnerabilities, followed by 12 more in November and December. And that doesn’t count fixes from vendors such as Adobe, Mozilla and others.
- Growing application risk: The makeup of vulnerabilities has shifted away from the operating system and into applications, including browsers (IE, Firefox, Safari), media players (QuickTime, Real Player, Windows Media Player) and document viewers (Adobe Reader).
With the New Year, resolve to learn techniques to stay on top of these new attacks. You can start with this recent white paper, 3 Strategies To Protect Endpoints from Risky Applications. You’ll learn why and how to employ effective patch management as a key part of your vulnerability remediation plan. And be better prepared for 2010 and beyond!
Vice President of Marketing, Dell KACE.
View a demo of the leading systems management appliance.