Have you heard about the new Internet Explorer Zero-Day vulnerability? Do you know hackers are already exploiting this actively today? And did you already take some measures? If not, let's see how we can help you with this.
On Monday 23/09/2019, a new patch has been released by Microsoft to fix an important vulnerability already publicly exploited.
Microsoft also announced that at the moment of writing these lines (25/09/2019), this update will only be available through the Catalog. Even if it will most probably be included in the next Patch Tuesday, it means that a manual action is required in order to install the fix as soon as possible. Indeed, waiting for the next Patch Tuesday will let this vulnerability on your devices for more than two weeks.
At EASI, we constantly monitor vulnerabilities on most common systems such as VMware, Windows, Linux, Firewalls, Network Devices...
As soon as a vulnerability is discovered, we analyzed it and define if an action is required.
If yes, we inform our customers who have subscribed to our Patch Management & Continuous Monitoring service and define together the best timing to fix the vulnerability.
These customers do not have to pay attention to new security breaches on their systems or network components as we are doing it for them.
Furthermore, this service includes regular patching on all their systems (Servers, Firewalls, Network Devices...) in order to make sure all the latest available security patches are installed as soon as possible.
Here are some other questions that could help you change your mind:
If one of the answer to these questions is no, then you might need some help. Don't hesitate to reach out without any obligation.