Skip to main content
Tag

patch strategy

||||

Tackling Endpoint Security Head-On in 2020

By Patch ManagementNo Comments

Tackling Endpoint Security Head-On in 2020

As cybersecurity hazards increase, every organization needs an endpoint security solution that can face the modern threat landscape with ease.

[vc_empty_space]
[vc_single_image image=”305244″ img_size=”full”]

Technology and the inherent interconnectedness it fosters provides businesses with near-limitless possibilities.

But with that potential comes no small amount of risks.

The broad spectrum of cybersecurity hazards is perhaps the clearest manifestation of that danger, and endpoint security lies at its core. Already a complicated issue by any standard, it’s only liable to become more complex and urgent to address in 2020.

Many factors play into this forecast. The rise of newer and more dangerous threats, from crippling denial-of-service ransomware to large-scale records theft, is certainly among them, but so is the proliferation of mobile devices as IoT endpoints. What’s undeniable is your organization’s need for an endpoint security solution that can face the modern threat landscape.

Maybe it’s your client database, including all of the financial and personal information you’ve collected in the partnership process, that suddenly becomes inaccessible. Perhaps key files are abruptly encrypted in a way that you’ve never seen before. Or maybe systems grind to a halt and won’t function. You see a message telling you, in so many words, to pay up or lose the data (or remain locked out of your mission-critical networks and devices). It’s a simple and often successful exploit tactic.

The Dollars-and-Cents Factors

To members of the C suite who aren’t chief information or technology officers, the urgency of cybersecurity threats may not be realized.

  • Although average organizational cybersecurity spend is up — from $584 per employee in 2012 to $1,178 in 2018 — that may not be nearly enough for large enterprises, or those within commonly targeted industries like finance or health care.
  • The average data breach anywhere in the world costs an organization $3.92 million. Specific figures vary by country (unsurprisingly, the U.S. average is highest, at $8.19 million), industry (healthcare breaches cost the most, at $6.45 million per incident) and incident severity.
  • All told, the impact of cybercrime costs the world as much as $600 billion each year.

The Endpoint Numbers Game

88% of IT professionals understand the importance of endpoint management and security, but a significant number of those individuals may not know exactly how many endpoints their organizations’ networks have.

Based on the current pace of tech development, the number of endpoints in any given system is bound to increase exponentially in 2020. Significant upticks in overall mobile device use, as well as expansion of the internet of things, will drive this, increasing organizations’ endpoint security risk by default.

More access points mean more vulnerabilities.

Cyberattackers’ Main Goal

Cyberattackers go about their criminal activities for various reasons: monetary gain, the excitement of causing chaos, information misuse, state-sponsored espionage and more.

But your IT team doesn’t have time to speculate about the reasons. There is only room for you to deal with attackers’ goals. Login and access credentials are going to be the primary target of their interloping efforts, with the intention of obtaining and purloining confidential information.

The initial shock of a cyberattack belies how adversely impactful it may be over an extended period of time. A breach’s lifecycle, from initial compromise to containment, lasts an average of 314 days, with about 279 of those directly spent on identification and eradication. You need to cut down that time frame as much as possible, and securing your endpoints is the best way to do that.

[vc_single_image image=”36938″ img_size=”full”]

Major Endpoint Threats to Watch in 2020

Endpoints, everything from PCs and smartphones to IoT-enabled printers, represent an attractive collection of weak spots to malicious online actors. Such cybercriminals will use malware to attack said endpoints in any way they can: through the operating system and application layers as well as at the firmware and BIOS levels.

Threats of particular note include:

  • Ransomware: These high-profile dedicated-denial-of-service attacks have successfully shut down municipal governments including Baltimore, Atlanta and Greenville, North Carolina during 2018 and 2019, and also devastated the healthcare sector.
  • Phishing: Social engineering threatens mobile endpoints just as much as desktops.
  • Rootkits/backdoor-access attacks: Cyberattackers who care more about theft (monetary or informational) than havoc may use subtler methods like these to gradually take what they want.
  • Employee negligence: Lax security-protocol adherence can leave endpoints more open to attack. For example, employee-owned mobile devices are the endpoints least likely to be properly secured.

Consistency in Endpoint Security

You can’t protect your network’s endpoints by operating on a case-by-case basis, going with the flow as different issues arise independent of one another. Doing so amounts to treating this as a “fly by the seat of your pants” issue, which is neither feasible nor responsible in the context of any aspect of cybersecurity (endpoint-related or otherwise).

It is critical for organizations to adopt consistent approaches to endpoint security in 2020 and beyond, fully comprehending and addressing all risks associated with its endpoints. This involves vetting the security capabilities of new devices before they are introduced to the network and continuously monitoring device vulnerability levels to ensure they never become dangerously outdated and unprotected.

Enforce Endpoint Security Hygiene

IT must relentlessly hold the organization to high endpoint security standards:

  • Retire and replace legacy hardware/software: Such resources are more likely than not to have unmanageable vulnerabilities.
  • Ensure all endpoints matter equally: An attacker entering via a networked printer (a commonly under-protected endpoint) likely isn’t interested in taking over that machine, but rather something far more destructive.
  • Keep up with trending threats: Note which scams are most prevalent among your industry peers and in general (like ransomware/DDoS attacks and botnets), without losing sight of less obvious possibilities (logic bombs, man-in-the-middle attacks, formjacking).
  • Maintain up-to-date patch management: Enable automatic updates for the most critical security patches, while handling less mission-critical patches manually. (Also, ensure patch application disrupts day-to-day operations minimally or not at all.)

Turn to Syxsense for More Secure Endpoints

Endpoint security is a complex and multifaceted issue requiring vigilance and cooperation across all departments within any given organization. Turning to the broad complement of endpoint security solutions offered by Syxsense will be an excellent place for you to start.

  • For a “one-stop-shop” with vulnerability scanning, patch management and endpoint detection and response in one package, look no further than Syxsense Secure. Available as a standalone software product or alongside 24/7 managed services from our dedicated, experienced team.
  • The similarly comprehensive Syxsense Manage solution offers additional endpoint, OS and patch management oversight to complete the picture of meticulous and wide-ranging threat management.

Begin your organization’s journey toward airtight endpoint security with a free trial of Syxsense’s products and services.

[vc_separator css=”.vc_custom_1552427883977{padding-top: 20px !important;padding-bottom: 20px !important;}”]

Experience the Power of Syxsense

Syxsense has created innovative and intuitive technology that sees and knows everything. Manage and secure your environment with a simple and powerful solution.

[vc_btn title=”Start a Free Trial” style=”gradient-custom” gradient_custom_color_1=”#da4453″ gradient_custom_color_2=”#8a2387″ shape=”round” size=”lg” align=”center” link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial|||” css=”.vc_custom_1572936982710{margin-top: 15px !important;}”][vc_separator css=”.vc_custom_1552427883977{padding-top: 20px !important;padding-bottom: 20px !important;}”]
||

Oracle Drops Critical Update Bomb

By News, Patch ManagementNo Comments
[vc_single_image image=”25308″ img_size=”full”]

Over 300 Vulnerabilities: 49 Rated as Critical

Oracle has just dropped its October 2018 update and it is a big one! Over 300 security flaws are addressed in this massive release. 49 of those flaws carry a critical CVSS rating (9 or higher).

One of these scored a ‘perfect’ critical rating of 10!

The flaw in question is CVE-2018-2913 for Oracle GoldenGate. According to Oracle’s Advisory, the flaw “may be remotely exploitable without authentication, i.e., may be exploited over a network without requiring user credentials.”

Of the remaining critical flaws, 45 have a CVSS rating of 9.8. This release is tackling a huge group of major vulnerabilities. Any organization running Oracle products should immediately scan their networks to figure out just how many devices require these updates.

Simplify Patch Management Tasks

If you want to make the patch management process more efficient, look to an IT solution such as Syxsense. The inventory scan feature can be set to regularly check your network and then display that information in easy to understand icons and graphs.

Then, move to the Patch Manager feature to set up a task to remediate the now obvious vulnerabilities. A task will be prepopulated for rapid deployment, or there are a multitude of controls to facilitate the update release strategy that works best for your unique environment.

Massive update bombs don’t have to wreak havoc on your work week. Discover a better way to manage your updates with Syxsense.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]
||||||

Severe Oracle Vulnerabilities

By NewsNo Comments
[vc_single_image image=”24773″ img_size=”full”]

WebLogic Server Needs Immediate Patching

If you are using an Oracle WebLogic Server in your environment, you must patch it now.

This easily exploitable vulnerability allows an unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server.

Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. To compound this further, it is currently being exploited and has been assigned a CVSS score of 9.8 out of 10.

More Oracle Updates

Oracle has released its July 2018 updates to address a total of 334 security vulnerabilities, the largest number of flaws resolved with a Critical Patch Update (CPU) to date. Over 200 of the bugs may be remotely exploitable without authentication.

Robert Brown, Director of Services for Verismic said, “IT Managers are so focused on patching Windows, that they lose focus on the applications within their environment which can be exploited just as easy as the OS.”

Your patching strategy should accommodate all weaknesses. This includes the applications used within your environment.

All Oracle customers are advised to apply the fixes included in Oracle’s Critical Patch Updates without delay, as some of the addressed vulnerabilities are being targeted by malicious actors in live attacks.

[dt_default_button link=”url:https%3A%2F%2Fwww.syxsense.com%2Fsyxsense-trial%2F|||” size=”big” button_alignment=”btn_center”]START FREE TRIAL[/dt_default_button]
[vc_separator]

Affected Products and Patch Information

Security vulnerabilities addressed by this Critical Patch Update affect the products listed below. The product area is shown in the Patch Availability Document column. Please click on the links in the Patch Availability Document column below to access the documentation for patch availability information and installation instructions.

Affected Products and Versions Patch Availability Document
Agile Recipe Management for Pharmaceuticals, version 9.3.4 Oracle Supply Chain Products
Enterprise Manager Base Platform, versions 12.1.0.5, 13.2.x Enterprise Manager
Enterprise Manager for Fusion Middleware, versions 12.1.0.5, 13.2.x Enterprise Manager
Enterprise Manager for MySQL Database, versions 13.2.2.0.0 and prior Enterprise Manager
Enterprise Manager for Oracle Database, versions 12.1.0.8, 13.2.2 Enterprise Manager
Enterprise Manager for Peoplesoft, versions 13.1.1.1, 13.2.1.1 Enterprise Manager
Enterprise Manager for Virtualization, versions 13.2.2, 13.2.3 Enterprise Manager
Enterprise Manager Ops Center, versions 12.2.2, 12.3.3 Enterprise Manager
FMW Platform, versions 12.2.1.2.0, 12.2.1.3.0 Fusion Middleware
Hardware Management Pack, version 11.3 Systems
Hyperion Data Relationship Management, version 11.1.2.4.330 Fusion Middleware
Hyperion Financial Reporting, version 11.1.2 Fusion Middleware
JD Edwards EnterpriseOne Tools, version 9.2 JD Edwards
JD Edwards World Security, versions A9.3, A9.3.1, A9.4 JD Edwards
MICROS 700 Series Tablet, versions Prior to BIOS 0.00.13ORC, Prior to BIOS 0.01.25ORC MICROS 700 Series Tablet
MICROS Handheld Terminal, versions 2018, Android 4.4.4 Security Patch Bulletin prior to February 1 MICROS Handheld Terminal
MICROS Kitchen Display Controller, versions Prior to BIOS 0.00.16ORC MICROS Kitchen Display System Hardware
MICROS Lucas, versions 2.9.5.3, 2.9.5.4, 2.9.5.5, 2.9.5.6 Retail Applications
MICROS Relate CRM Software, versions 10.8.x, 11.4.x Retail Applications
MICROS Retail-J, versions 10.2.x, 11.0.x, 12.0.x, 12.1.x, 12.1.1.x, 12.1.2.x, 13.1.x Retail Applications
MICROS Workstation 6, versions prior to BIOS 1.3.1.0, prior to BIOS 1.5.2.0, prior to BIOS 2.3.1.0 MICROS Workstation
MICROS XBR, versions 7.0.2, 7.0.4 Retail Applications
MySQL Client, versions 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior, 8.0.11 and prior MySQL
MySQL Connectors, versions 5.3.10 and prior, 8.0.11 and prior MySQL
MySQL Enterprise Monitor, versions 3.4.7.4297 and prior, 4.0.4.5235 and prior, 8.0.0.8131 and prior MySQL
MySQL Server, versions 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior, 8.0.11 and prior MySQL
MySQL Workbench, versions 6.3.10 and prior, 8.0.11 and prior MySQL
Oracle Agile Engineering Data Management, versions 6.1.3, 6.2.0, 6.2.1 Oracle Supply Chain Products
Oracle Agile PLM, versions 9.3.3, 9.3.4, 9.3.5, 9.3.6 Oracle Supply Chain Products
Oracle Agile PLM MCAD Connector, versions 3.3, 3.4, 3.5, 3.6 Oracle Supply Chain Products
Oracle Agile Product Lifecycle Management for Process, version 6.2.0.0 Oracle Supply Chain Products
Oracle API Gateway, version 11.1.2.4.0 Fusion Middleware
Oracle Application Testing Suite, version 10.1 Enterprise Manager
Oracle AutoVue VueLink Integration, versions 21.0.0, 21.0.1 Oracle Supply Chain Products
Oracle Banking Corporate Lending, versions 12.3.0, 12.4.0, 12.5.0, 14.0.0, 14.1.0 Oracle Financial Services Applications
Oracle Banking Payments, versions 12.2.0, 12.3.0, 12.4.0, 12.5.0, 14.1.0 Oracle Financial Services Applications
Oracle Banking Platform, versions 2.6.0, 2.6.1, 2.6.2 Oracle Banking Platform
Oracle BI Publisher, versions 11.1.1.7.0, 11.1.1.9.0, 12.2.1.2.0, 12.2.1.3.0 Fusion Middleware
Oracle Business Process Management Suite, versions 11.1.1.7.0, 11.1.1.9.0, 12.1.3.0.0, 12.2.1.2.0, 12.2.1.3.0 Fusion Middleware
Oracle Communications Diameter Signaling Router (DSR), versions 7.x, 8.x Oracle Communications Diameter Signaling Router
Oracle Communications EAGLE LNP Application Processor, version 10.x Oracle Communications EAGLE LNP Application Processor
Oracle Communications Interactive Session Recorder, versions 5.x, 6.x Oracle Communications Interactive Session Recorder
Oracle Communications Messaging Server, version 3.x Oracle Communications Convergence
Oracle Communications Network Charging and Control, versions 4.4.1.5.0, 5.0.0.1.0, 5.0.0.2.0, 5.0.1.0.0, 5.0.2.0.0 Oracle Communications Network Charging and Control
Oracle Communications Policy Management, version 12.x Oracle Communications Policy Management
Oracle Communications Session Border Controller, versions ECz7.x, ECz8.x Oracle Communications Session Border Controller
Oracle Communications User Data Repository, versions 10.x, 12.x Oracle Communications User Data Repository
Oracle Database Server, versions 11.2.0.4, 12.1.0.2, 12.2.0.1, 18.1, 18.2 Database
Oracle E-Business Suite, versions 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 E-Business Suite
Oracle Endeca Information Discovery Studio, versions 3.1, 3.2 Fusion Middleware
Oracle Enterprise Data Quality, version 12.2.1.3.0 Fusion Middleware
Oracle Enterprise Repository, versions 11.1.1.7.0, 12.1.3.0.0 Fusion Middleware
Oracle Financial Services Analytical Applications Infrastructure, versions 7.3.3.x, 8.0.x Oracle Financial Services Analytical Applications Infrastructure
Oracle Financial Services Behavior Detection Platform, version 8.0.x Oracle Financial Services Behavior Detection Platform
Oracle Financial Services Funds Transfer Pricing, versions 6.1.1, 8.0.x Oracle Financial Services Funds Transfer Pricing
Oracle Financial Services Hedge Management and IFRS Valuations, versions 8.0.4, 8.0.5 Oracle Financial Services Hedge Management and IFRS Valuations
Oracle Financial Services Loan Loss Forecasting and Provisioning, versions 8.0.4, 8.0.5 Oracle Financial Services Loan Loss Forecasting and Provisioning
Oracle Financial Services Profitability Management, versions 6.1.1, 8.0.x Oracle Financial Services Profitability Management
Oracle Financial Services Revenue Management and Billing, versions 2.3.0.2.0, 2.4.0.0.0, 2.4.0.1.0, 2.5.0.1.0, 2.5.0.2.0, 2.5.0.3.0 Oracle Financial Services Revenue Management and Billing
Oracle FLEXCUBE Enterprise Limits and Collateral Management, versions 12.3.0, 14.0.0, 14.1.0 Oracle Financial Services Applications
Oracle FLEXCUBE Investor Servicing, versions 12.0.4, 12.1.0, 12.3.0, 12.4.0 Oracle Financial Services Applications
Oracle FLEXCUBE Universal Banking, versions 11.3.0, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0, 12.4.0, 14.0.0, 14.1.0 Oracle Financial Services Applications
Oracle Fusion Middleware, versions 12.2.1.2, 12.2.1.3 Fusion Middleware
Oracle Fusion Middleware MapViewer, versions 12.2.1.2, 12.2.1.3 Fusion Middleware
Oracle Global Lifecycle Management OPatchAuto, version All Oracle Global Lifecycle Management OPatchAuto
Oracle Hospitality Cruise Fleet Management System, version 9.x Oracle Hospitality Cruise Fleet Management
Oracle Hospitality Cruise Shipboard Property Management System, version 8.x Oracle Hospitality Cruise Shipboard Property Management System
Oracle Hospitality Gift and Loyalty, version 9.0.0
July 26, 2018