{"id":738,"date":"2024-08-19T08:38:58","date_gmt":"2024-08-19T13:38:58","guid":{"rendered":"https:\/\/cmitsolutions.com\/boston-ma-1089\/?p=738"},"modified":"2024-08-19T21:17:32","modified_gmt":"2024-08-20T02:17:32","slug":"vulnerability-management-why-you-need-it","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/vulnerability-management-why-you-need-it\/","title":{"rendered":"Vulnerability Management &#8211; Why You Need It"},"content":{"rendered":"<p>Vulnerability management is a fundamental aspect of an information security and privacy program. If done well it provides a strong foundation for your company, its data and your clients\u2019 data. Done poorly, and the doors are wide open for your company to be hacked, its data breached, and your clients\u2019 privacy violated. <a href=\"https:\/\/staysafeonline.org\/blog\/the-impact-of-data-breaches\/\"><span style=\"color: #003366\">Only 14 percent of small businesses rated their ability to mitigate cyber risk and vulnerabilities as useful<\/span><\/a>. So, you know it\u2019s important, but what is vulnerability management and how is it achieved?<\/p>\n<p>At its core, vulnerability management involves:<\/p>\n<h5><strong>IDENTIFYING THE DEVICES IN YOUR ORGANIZATION<\/strong><\/h5>\n<p>This can include servers, workstations, IoT devices, routers, switches, firewalls, mobile phones\u2014basically anything connecting to your network.<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Device-Checklist-1024x247-1.png\"><img decoding=\"async\" class=\"alignnone wp-image-739 size-full\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Device-Checklist-1024x247-1.png\" alt=\"\" width=\"1024\" height=\"247\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Device-Checklist-1024x247-1.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Device-Checklist-1024x247-1-300x72.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Device-Checklist-1024x247-1-768x185.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h5><strong>ASSESSING SECURITY WITH A VULNERABILITY SCAN<\/strong><\/h5>\n<p>Next, you need to assess all of those devices. Typically, this is done via a <a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/how-vulnerability-scanning-keeps-your-business-secure\/\">vulnerability scan<\/a>. A vulnerability scan involves scanning each device to determine what they are, any vulnerabilities or weaknesses that exist in those devices and providing a report about those vulnerabilities.<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Vulnerability-Test-Scan-1024x628-1.png\"><img decoding=\"async\" class=\"alignnone wp-image-740 size-full\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Vulnerability-Test-Scan-1024x628-1.png\" alt=\"Vulnerability Test Scan image\" width=\"1024\" height=\"628\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Vulnerability-Test-Scan-1024x628-1.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Vulnerability-Test-Scan-1024x628-1-300x184.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Vulnerability-Test-Scan-1024x628-1-768x471.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h5><strong>REMEDIATING AND MITIGATING VULNERABILITIES<\/strong><\/h5>\n<p>Remediation and mitigation are a critical aspect of the vulnerability management process. During this phase of the process vulnerabilities identified during the vulnerability scan are reviewed in detail to understand how to best address them. In many cases the vulnerabilities can be remediated by applying patches, updating the operating system or firmware, or updating an application. Sometimes, extensive changes must be undertaken to address vulnerabilities such as disabling older insecure protocols, rearchitecting a system or switching to a more secure service or application.<\/p>\n<p>Oftentimes it is not possible to completely remediate a vulnerability. This is a frequent occurrence for legacy systems or apps. These older platforms continue to be used for a critical business function but cannot be updated for any number of reasons. When this happens, other mitigations can be put in place such as creating a \u201csandbox\u201d for a system that cannot be updated or otherwise made not vulnerable. A sandbox is a protected network that has limited access to or from it in order to limit the exposure of a vulnerable system. Sandboxing effectively disables some services by reducing the number of vulnerabilities associated with a system. If that is not possible, documenting that a given system must remain in a vulnerable state is critical because it is needed for a business purpose and cannot be updated or migrated.<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Virtual-Sandbox-Concept-Image-1024x346-1.png\"><img decoding=\"async\" class=\"alignnone wp-image-741 size-full\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Virtual-Sandbox-Concept-Image-1024x346-1.png\" alt=\"Virtual Sandbox Concept\" width=\"1024\" height=\"346\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Virtual-Sandbox-Concept-Image-1024x346-1.png 1024w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Virtual-Sandbox-Concept-Image-1024x346-1-300x101.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Virtual-Sandbox-Concept-Image-1024x346-1-768x260.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h5><strong>SAFEGUARD YOUR ORGANIZATION<br \/>\n<\/strong><\/h5>\n<p>A robust vulnerability management program becomes the cornerstone of a company\u2019s information security and privacy posture. Vulnerability management helps prevent hacking and data breaches, while protecting the privacy of your data and your company from legal liability. It effectively acts a shield to safeguard your organization. Neglecting vulnerabilities will only leave your organization susceptible to a data breach \u2013 and SMBs are known to underestimate the cost. Your trusted CMIT advisor performs vulnerability scans and remediation. Please contact us for more information. We\u2019re always here to help.<\/p>\n<p>Written by: <span style=\"color: #003366\"><a style=\"color: #003366\" title=\"About\" href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/about\/\">Chris Zambuto<\/a><\/span> | Chief Information Security Officer <span style=\"color: #003366\"><a style=\"color: #003366\" href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\">@<\/a><\/span><a href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\"><span style=\"color: #003366\">CMITBostonCambridge<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability management is a fundamental aspect of an information security and privacy&#8230;<\/p>\n","protected":false},"author":259,"featured_media":1031,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[29,32,41,16],"class_list":["post-738","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blog","tag-cmit-solutions","tag-cybersecurity","tag-information-security","tag-vulnerability-scanning"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/comments?post=738"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/738\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media\/1031"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media?parent=738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/categories?post=738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/tags?post=738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}