Maintain Your &%$#* Systems! A Mantra for IT Professionals in the Wake of Equifax

Share and earn Cybytes
Facebook Twitter LinkedIn Email

Once again, we have a basic failure in cyber hygiene causing a massive data breach. This one affects potentially half of the U.S. population and compromises particularly sensitive personal information that can be used by criminals to wreak havoc on people’s bank accounts, credit scores and identities.

I’m referring, of course, to the Equifax breach. What I find particularly disturbing is that criminals took advantage of a known vulnerability for which a patch had been available for two months. Let that sink in for a moment — two months is an eternity of exposure to hostile internet actors when efficient systems management and compensating controls are readily available. In fact, the Tenable team had published this post in March about this particular Apache Struts vulnerability and the availability of Tenable plugins. In an era where companies are continuously updating their software, IT and security teams should be consistently patching bugs and closing vulnerabilities as they are reported.

These types of attacks take advantage of the worst and most common habits — the avoidance of doing something as simple as maintaining good cyber hygiene and patching systems.  Cyber criminals don’t need to waste a precious and rare zero-day exploit when they can easily get into your network using a known exploit of an unpatched vulnerability.

Every organization has a responsibility to know what systems it operates and which ones it relies on.  To know those systems are exposed and to efficiently manage and reduce cyber risk, frequently through patching and compensating controls.  This isn’t sexy work, but it gets the job done. Maintaining good cyber hygiene is so fundamental to building a solid, scalable and IT program that it ought to be a requirement against which all IT functions are measured. Imagine the benefits to the business if CIOs and CISOs rewarded their teams for maintaining top rate systems hygiene and celebrated defense and prevention?

Just as doctors take the Hippocratic oath to “first do no harm,” IT and security teams ought to adopt a similar mantra, “Maintain your systems.” That is the surest way to keep the business healthy and safe from cybercriminals. And it’s the only way we’re going to stop this vicious cycle of breaches and the inevitable face palm that results from knowing the breach was entirely preventable.

Share this post and earn Cybytes
Facebook Twitter LinkedIn Email
About Tenable
Tenable™, Inc. is the Cyber Exposure company. Over 24,000 organizations of all sizes around the globe rely on Tenable to manage and measure their modern attack surface to accurately understand and reduce cyber risk. As the creator of Nessus®, Tenable built its platform from the ground up to deeply understand assets, networks and vulnerabilities, extending this knowledge and expertise into™ to deliver the world’s first platform to provide live visibility into any asset on any computing platform. Tenable customers include over 50 percent of the Fortune 500, large government agencies and organizations across the private and public sectors. Learn more at
Promoted Content
Five Steps to Building a Successful Vulnerability Management Program
Is your vulnerability management program struggling? Despite proven technology solutions and the best efforts of IT teams, unresolved vulnerabilities remain an ongoing source of friction and frustration in many organizations. Regardless of how many vulnerabilities are fixed, there will always be vulnerabilities that can’t easily be remediated – and too often, finger-pointing between IT teams and business groups can ensue.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?