Have you heard about the new Internet Explorer Zero-Day vulnerability? Do you know hackers are already exploiting this actively today? And did you already take some measures? If not, let's see how we can help you with this.
On Monday 23/09/2019, a new patch has been released by Microsoft to fix an important vulnerability already publicly exploited.
Microsoft also announced that at the moment of writing these lines (25/09/2019), this update will only be available through the Catalog. Even if it will most probably be included in the next Patch Tuesday, it means that a manual action is required in order to install the fix as soon as possible. Indeed, waiting for the next Patch Tuesday will let this vulnerability on your devices for more than two weeks.
Patch Management & Continuous Monitoring
At EASI, we constantly monitor vulnerabilities on most common systems such as VMware, Windows, Linux, Firewalls, Network Devices...
As soon as a vulnerability is discovered, we analyzed it and define if an action is required.
If yes, we inform our customers who have subscribed to our Patch Management & Continuous Monitoring service and define together the best timing to fix the vulnerability.
These customers do not have to pay attention to new security breaches on their systems or network components as we are doing it for them.
Furthermore, this service includes regular patching on all their systems (Servers, Firewalls, Network Devices...) in order to make sure all the latest available security patches are installed as soon as possible.
Not convinced yet?
Here are some other questions that could help you change your mind:
- Do you already have a Patch Management procedure?
- Do you have the time to follow security news?
- Do you have the time to test the released patches?
- Do you have the knowledge to understand all these complex vulnerabilities and perform the right action?
If one of the answer to these questions is no, then you might need some help. Don't hesitate to reach out without any obligation.