{"id":21578,"date":"2023-08-28T18:08:51","date_gmt":"2023-08-28T14:08:51","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=21578"},"modified":"2023-08-28T18:08:51","modified_gmt":"2023-08-28T14:08:51","slug":"patching-priorities","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/patching-priorities\/21578\/","title":{"rendered":"What to patch first: prioritizing updates"},"content":{"rendered":"<p>Updating software on employee workstations is a never-ending, constant process. Thus, you may simply lack the resources to keep updating all software. On average, dozens of new vulnerabilities are found every single day; accordingly, many hundreds and even thousands of patches for them are released every month.<\/p>\n<p>This poses the question: what updates should be a priority? And there\u2019s no simple answer to that. <a href=\"https:\/\/www.kaspersky.com\/blog\/patching-strategy-rsa2019\/26176\/\" target=\"_blank\" rel=\"noopener nofollow\">Patching strategies can be very different<\/a>, and finding the one that works best for your company can depend on various circumstances. In this post, I share some thoughts on what software should be patched first \u2014 based on the potential risk of vulnerability exploitation.<\/p>\n<h2>Got any vulnerabilities on your system?<\/h2>\n<p>Some people believe that the number of discovered vulnerabilities speaks of the given software\u2019s quality. Simply put, more bugs means worse software, and a lack of any ever reported means that software is great. These considerations then affect their choices of corporate software.<\/p>\n<p>But this is, of course, a misperception: the number of detected vulnerabilities generally speaks of the program\u2019s popularity, not quality. You can find bugs anywhere. And most of the time, bugs are discovered where people look for them. A company could get by using some long-forgotten software product just because nobody ever found any vulnerabilities in it. But that would be an unwise strategy: what if someone actually tries and succeeds in discovering a whole load of them right away?<\/p>\n<p>In a nutshell, it\u2019s not the number of bugs that matters, but how quickly patches for them come out and if they actually fix problems. Quick and regular patching is a good thing. While rare, sporadic releases \u2014 with the vendor trying to pretend that nothing bad has happened \u2014 are a disturbing sign; such software should be avoided.<\/p>\n<p>Another good thing is when the developer runs a bug bounty program \u2014 even better if the program is open for everyone. A bad thing is a vendor threatening to sue bug hunters (yes, it happens more often than one would imagine), or worse: dragging people to court for reporting vulnerabilities.<\/p>\n<h2>Operating systems<\/h2>\n<p>But let\u2019s get back to patching prioritization. The obvious candidates for the highest priority are operating systems. All-important OS updates must be installed as quickly as possible. The risk is self-evident: a compromised OS is the key to the rest of the computer\u2019s software.<\/p>\n<p>So if you use Windows, it\u2019s in your best interests to at least look through the list of Microsoft updates <a href=\"https:\/\/en.wikipedia.org\/wiki\/Patch_Tuesday\" target=\"_blank\" rel=\"nofollow noopener\">on the second Tuesday of each month<\/a>, and install them ASAP. But you should still follow the news: if a Windows patch comes out on a different date, it should be installed right away.<\/p>\n<h2>Browsers<\/h2>\n<p>There are several solid reasons to prioritize browser updates. Firstly, browsers account for much of our digital activity these days. Secondly, browsers by definition interact with the internet, so they\u2019re one of the first to be affected by any cyberthreats. Thirdly, attackers spare no effort looking for browser vulnerabilities, often succeed and quickly turn to exploiting them.<\/p>\n<p>So try to install browser patches pronto. Additionally don\u2019t forget to restart your browser after an update: until you do, the old, vulnerable version remains in use. Keep in mind that your system may have more than one browser installed. They all need timely updates.<\/p>\n<p>And speaking of multiple browsers, there\u2019s a couple of things to keep in mind:<\/p>\n<ul>\n<li>Internet Explorer: hardly any user\u2019s free choice anymore, but this browser is still featured <a href=\"https:\/\/www.kaspersky.com\/blog\/internet-explorer-is-finally-dead-or-is-it\/48104\/\" target=\"_blank\" rel=\"noopener nofollow\">on any Windows computer<\/a> \u2014 and needs timely patching.<\/li>\n<li>Many desktop apps (for example, <a href=\"https:\/\/www.kaspersky.com\/blog\/dangers-of-desktop-messengers\/47453\/\" target=\"_blank\" rel=\"noopener nofollow\">messengers<\/a>) are based on the Electron framework \u2014 technically a Chromium browser opened in a web app. Don\u2019t forget to update them too, as they automatically inherit every Chromium flaw out there.<\/li>\n<\/ul>\n<h2>Office suites<\/h2>\n<p>Attacks through emails with malicious attachments are a <a href=\"https:\/\/www.kaspersky.com\/blog\/mdr-report-contribution\/44584\/\" target=\"_blank\" rel=\"noopener nofollow\">classic cybercriminal move<\/a>. They mostly rely on infected files \u2014 especially Microsoft Office and PDF documents. This means that office suite programs\u2019 vulnerabilities often serve as an entry point into the target company\u2019s network. Therefore, you should pay close attention to office software updates.<\/p>\n<p>In most cases, malware attachments don\u2019t open themselves \u2014 somebody has to click on them. That\u2019s why it\u2019s important to provide information security training for your employees \u2014 for example, on our interactive educational <a href=\"https:\/\/k-asap.com\/en\/?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder____kasap___\" target=\"_blank\" rel=\"noopener\">Kaspersky Automated Security Awareness Platform<\/a>.<\/p>\n<p>It\u2019s also a good idea to set up an internal <a href=\"https:\/\/www.kaspersky.com\/blog\/cybersecurity-internal-communication\/48433\/\" target=\"_blank\" rel=\"noopener nofollow\">communication channel<\/a> with your information security department: on the one hand, to alert your employees about relevant threats and improve general awareness; on the other, to receive their reports on various suspicious activity, including in their email boxes.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kasap\">\n<h2>Cybersecurity solutions<\/h2>\n<p>As mentioned above, vulnerabilities can be found in any software \u2014 and security products are no exception. Antiviruses and other information security applications need lots of high-level permissions to operate efficiently, so a successful exploitation of a security solution\u2019s vulnerability might cause very serious problems.<\/p>\n<p>Security software developers are aware of the potential danger of such a scenario better than anyone else. Therefore, they try to promptly respond to reported vulnerabilities and release updates ASAP. Of course, promptness is equally important when installing those patches. We recommend monitoring your security products\u2019 updates diligently and prioritizing their installation.<\/p>\n<h2>Work collaboration apps<\/h2>\n<p>One more software category that has earned special significance for office employees in the past decade requires special attention. I\u2019m referring to work collaboration apps, such as Microsoft Teams, Slack, Confluence, and the like. In many companies these have gradually taken over a considerable part of business correspondence, file exchange, and conference calls.<\/p>\n<p>Naturally, collaboration tools have become an attractive target for cybercriminals: they can usually learn a lot of juicy things from the content that\u2019s transferred through collaboration apps. It\u2019s important to keep these apps up to date with the latest security patches.<\/p>\n<p>Here\u2019s one more reason not to postpone updating your collaboration tools. As I mentioned above, every app based on the Electron framework is technically a Chromium browser \u2014 with all its vulnerabilities so popular among cybercriminals. And guess what? Electron is also quite a common framework for collaboration tools. For instance, it\u2019s the backbone of the desktop versions of both Teams and Slack. <\/p>\n<p>To protect employees\u2019 computers from hacking at those unpleasant moments when a vulnerability has already been found but a patch for it hasn\u2019t yet been released, be sure to use reliable protection on all corporate devices. By the way, a number of our solutions for business \u2014 including <a href=\"https:\/\/me-en.kaspersky.com\/small-to-medium-business-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Endpoint Security for Business<\/a> and <a href=\"https:\/\/me-en.kaspersky.com\/enterprise-security\/cloud-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2b_kasperskydaily_wpplaceholder_______\" target=\"_blank\" rel=\"noopener\">Kaspersky Hybrid Cloud Security Enterprise<\/a> \u2014 feature the built-in Kaspersky Vulnerability and Patch Management system that helps you automate and properly prioritize your software updates.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial\">\n","protected":false},"excerpt":{"rendered":"<p>Some thoughts on what PC software patches should be prioritized and why.<\/p>\n","protected":false},"author":2726,"featured_media":21579,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1916,1917],"tags":[2088,1636,905,2684,681,398,2685,131,121,268,113],"class_list":{"0":"post-21578","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-enterprise","9":"category-smb","10":"tag-tips","11":"tag-browsers","12":"tag-office","13":"tag-operating-systems","14":"tag-patch","15":"tag-patches","16":"tag-security-solutions","17":"tag-tips-2","18":"tag-updates","19":"tag-vulnerabilities","20":"tag-windows"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/patching-priorities\/21578\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/patching-priorities\/26116\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/patching-priorities\/28808\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/patching-priorities\/26424\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/patching-priorities\/26624\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/patching-priorities\/29098\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/patching-priorities\/35929\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/patching-priorities\/48867\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/patching-priorities\/21691\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/patching-priorities\/30386\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/patching-priorities\/34650\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/patching-priorities\/26693\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/patching-priorities\/32426\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/patching-priorities\/32083\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/tips-2\/","name":"tips"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2726"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21578"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21578\/revisions"}],"predecessor-version":[{"id":21582,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21578\/revisions\/21582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21579"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}