In the News: In the wake of the CrowdStrike outage, here’s a workable four-step patching strategy
Published originally on August 15, 2024 on SC Magazine

By Ashley Leonard

ANALYSIS: The recent CrowdStrike incident in which an auto-update took down airports and medical facilities around the world highlights one of the huge risks companies face today relying on vendor-enabled auto-updates.

Many organizations use application and operating system auto-updates to keep their applications fully updated and secure. While it’s vital that all software gets patched to secure the organization from threats and comply with several security standards and regulatory requirements, it’s extremely dangerous to rely on auto-updates to perform these tasks.

We’ve all now seen the results of an auto-update gone bad.

In my 30 years of helping global organizations patch and secure all their endpoints, this recent global IT outage involving CrowdStrike and Microsoft machines highlights how fundamental, and yet difficult patching has become for many organizations. Our team helps enterprises refine their patch and updating strategy to ensure their endpoints are secure while minimizing any operational risks to the organization. Here are some of the best practices we’ve learned along the way.

 

Go to SC Magazine to read the full article, with four key steps you can take today, to stay resilient.