{"id":92365,"date":"2024-10-16T12:08:01","date_gmt":"2024-10-16T04:08:01","guid":{"rendered":"https:\/\/version-2.com\/?p=92365"},"modified":"2024-10-14T12:11:57","modified_gmt":"2024-10-14T04:11:57","slug":"boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/10\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/","title":{"rendered":"Boosting cyber health: How vulnerability and patch management decrease threat exposure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"92365\" class=\"elementor elementor-92365\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c10998537\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/VAPM_thumb.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/em><\/p><p>\u00a0<\/p><\/div><div id=\"content-c10998540\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>The topic of vulnerabilities remains significant as new exploits emerge, underscoring the need for continuous vigilance and proactive defense strategies.\u00a0<\/em><\/p><p>In a world that records on average at least 7,240 new vulnerabilities per quarter (based on <a href=\"https:\/\/www.cve.org\/About\/Metrics\" target=\"_blank\" rel=\"noopener\">2023 data<\/a>), patching critical vulnerabilities should be an immediate priority; otherwise, users might face anything from exposing confidential data all the way to opening their entire networks to <a href=\"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a> or <a href=\"https:\/\/arstechnica.com\/security\/2024\/08\/students-scramble-after-security-breach-wipes-13000-devices\/\" target=\"_blank\" rel=\"noopener\">wiperware<\/a>. The possible negative scenarios are <a href=\"https:\/\/www.welivesecurity.com\/2021\/07\/29\/most-exploited-vulnerabilities-report\/\" target=\"_blank\" rel=\"noopener\">unlimited<\/a>.<\/p><p>Thus, focusing on your business\u2019 cyber health matters, and with data breach costs climbing into <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noopener\">several millions of dollars<\/a>, patching all your devices\/OSs grows considerably more critical.<\/p><\/div><div><div id=\"content-c11001939\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">A health check on vulnerabilities<\/h3><\/header><p>First of all, doctors usually say that humans should support their health by ingesting a healthy dose of vitamins every day \u2013 lowering the chances of having compromised immune systems, leading to constant bouts of sickness. For organizations, the situation is much the same. Without investing in all-encompassing cybersecurity measures and awareness training, their body (business) will be left vulnerable to compromises (literally).<\/p><p>However, it seems that just like humans tend to underestimate their need for vitamins and health checks, so do businesses forgo important security checks and patching. There have been a plethora of cases where a business was breached due to a known vulnerability. For example, Equifax in 2017 was breached thanks to unpatched vulnerabilities<sup>1<\/sup>, which threat actors used to get their hands on the private records of 147.9 million Americans.<\/p><p>Overall, this catastrophic <a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/2017-data-breach-will-cost-equifax-at-least-1-38-billion\" target=\"_blank\" rel=\"noopener\">breach cost Equifax around 1.4 billion USD<\/a>. For a smaller business, such costs, even in proportion to their revenues, would likely bury them completely. A larger enterprise might weather the storm, but there is a high chance that they could fold as well, and all because their patching was, well, \u201cpatchy.\u201d<\/p><\/div><div id=\"content-c11001940\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Recording vulnerabilities \u2013 are you immune enough?<\/h3><\/header><p>The database of <a href=\"https:\/\/www.cve.org\/About\/Metrics\" target=\"_blank\" rel=\"noopener\">Common Vulnerabilities and Exposures (CVEs)<\/a> recorded 28,961 vulnerabilities for 2023 alone, representing a 15% rise compared to the previous year. For Q1 2024, 8,697 have already been reported (for comparison, in Q1 2023 it was 7,015).<\/p><p>Endpoints such as servers or computers <a href=\"https:\/\/www.forescout.com\/resources\/2024-riskiest-connected-devices\/\" target=\"_blank\" rel=\"noopener\">remain risky<\/a>, as they can harbor unpatched systems and apps. The same research also highlights how ransomware gangs are becoming more skilled, using programming languages that can more easily cross-compile, simultaneously targeting Windows and Linux systems.<\/p><p>There\u2019s an online myth that Linux is inherently more secure than other systems \u2013 since threat actors only target commonly used ones. Said myth is easily debunked though, as Linux is one of the most widely used systems globally. It makes up approximately<a href=\"https:\/\/www.zdnet.com\/home-and-office\/networking\/can-the-internet-exist-without-linux\/\" target=\"_blank\" rel=\"noopener\"> 96% of web server infrastructure<\/a>, while Android represents<a href=\"https:\/\/gs.statcounter.com\/os-market-share\/mobile\/worldwide\" target=\"_blank\" rel=\"noopener\"> 72% of the global mobile market<\/a> share.<\/p><p>Recently, ESET Research broke a story about the <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/ebury-alive-unseen-400k-linux-servers-compromised-cryptotheft-financial-gain\/\" target=\"_blank\" rel=\"noopener\">Ebury botnet<\/a> compromising around 400K Linux servers for cryptocurrency theft and other criminal activities. ESET researchers have also exposed numerous <a href=\"https:\/\/www.welivesecurity.com\/2018\/12\/05\/dark-side-of-the-forsshe\/\" target=\"_blank\" rel=\"noopener\">OpenSSH backdoors<\/a>, leading to the documentation of almost 21 Linux-based malware families with credential-stealing and backdoor functionalities. Additionally, threat actors target Linux-based high-performance computing (HPC) clusters with sophisticated malware like <a href=\"https:\/\/www.welivesecurity.com\/2021\/02\/02\/kobalos-complex-linux-threat-high-performance-computing-infrastructure\/\" target=\"_blank\" rel=\"noopener\">Kobalos<\/a>.<\/p><p>Thus, threats targeting Linux-based systems are quite real and can pack quite a punch to the gut of business security.<\/p><\/div><div id=\"content-c11001941\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">The ABCs of vulnerability solutions<\/h3><\/header><p>Why deal with vulnerabilities, specifically? For a business that could already consider its cyber posture \u201cready\u201d or \u201cfull,\u201d it could seem like its current security software can take care of everything.<\/p><p>That\u2019s not an entirely accurate observation. Endpoint security products in and of themselves are usually made up of multiple layers guaranteeing strong protection \u2013 but that doesn\u2019t mean that your endpoint product can protect against every single external threat. There\u2019s a reason why <a href=\"https:\/\/www.eset.com\/blog\/enterprise\/how-xdr-and-mdr-help-secure-your-tomorrow-against-ransomware\/\" target=\"_blank\" rel=\"noopener\">detection and response<\/a> or <a href=\"https:\/\/www.eset.com\/blog\/business\/i-am-not-sorry-for-wasting-your-time-lessons-to-learn-from-texonto-psyops-targeting-ukraine\/\" target=\"_blank\" rel=\"noopener\">cloud security<\/a> are a thing these days; it\u2019s all about minimizing risk by shrinking the attack surface as much as one can.<\/p><p>Though security tools can remediate rather quickly (with <a href=\"https:\/\/www.eset.com\/blog\/enterprise\/eset-world-2024-tomorrows-threats-require-modern-prevention-with-mdr\/\" target=\"_blank\" rel=\"noopener\">ESET-managed services<\/a> responding in as little as 20 minutes), every piece of a security stack plays a different and important part in the active protection process.<\/p><p>Keeping ahead of attackers by preventing them from finding that vulnerable spot is the key to your security. Said spots can be anywhere \u2013 in an app, device OS, or server infrastructure \u2013 presenting multiple potential entry points. However, the right vulnerability and patch management solution can provide the necessary tools to assess and provide patching opportunities for that unsecure spot \u2013 wherever it may be.<\/p><\/div><div id=\"content-c11001942\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">ESET Vulnerability and Patch Management (V&amp;PM) \u2013 a healthy dose of vitamins<\/h3><\/header><p>As illustrated previously, threat development is more flexible than before, and defenses need to be shored up to protect all devices that a business employs.<\/p><p>With <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/vulnerability-patch-management\/\" target=\"_blank\" rel=\"noopener\">ESET Vulnerability and Patch Management<\/a>, which is now also offered as a separate add-on to <a href=\"https:\/\/www.eset.com\/int\/business\/small-and-medium\/\" target=\"_blank\" rel=\"noopener\">ESET PROTECT Entry and ESET PROTECT Advanced<\/a>, even the smallest firm can start its prevention-first journey, warding off tomorrow\u2019s threats looking to infiltrate their premises.<\/p><p>The V&amp;PM module is directly integrated into the ESET PROTECT Platform and is always on \u2013 making it easy to stay up to date \u2013 protecting against attacks, zero-days, and ransomware all at once. Thus, ensuring visibility and situational awareness, which the entirely new V&amp;PM dashboard improves by giving instant overviews of the vulnerability and patching status across an entire business network.<\/p><p>Moreover, to answer the need for comprehensive vulnerability assessment and patching, ESET has expanded the V&amp;PM module by adding further system treatment into its repertoire \u2013 now also covering Linux<sup>2<\/sup> and macOS<sup>3<\/sup>.<\/p><p>For Windows and Linux servers, we understand that admins need full control, therefore, on these systems, the V&amp;PM module is not automated and gives admins total control over the entire process, so that they don\u2019t interrupt business workflows.<\/p><p>And if a security admin is growing suspicious about a particular system, on-demand vulnerability scanning will enable them to act quickly in case the need arises.<\/p><\/div><div id=\"content-c11001943\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Sickness be gone!<\/h3><\/header><p>With current security tools like the comprehensive ESET V&amp;PM module, breaches traced to a vulnerability are no longer about bad luck \u2013 they are about inattentiveness and underestimation, both of which have enormous security and even <a href=\"https:\/\/www.allens.com.au\/insights-news\/insights\/2023\/05\/a-ticking-time-bomb-limitations-in-cyber-cover-for-known-vulnerabilities-and-end-of-life-hardware\/\" target=\"_blank\" rel=\"noopener\">existential consequences<\/a> for organizations.<\/p><p>Upping the ante in this important area is compliance, with regulations such as <a href=\"https:\/\/www.eset.com\/blog\/company\/what-does-nis2-mean-to-you\/\" target=\"_blank\" rel=\"noopener\">NIS2 in Europe<\/a>, and <a href=\"https:\/\/www.scmagazine.com\/resource\/pci-dss-4-0-what-changes-for-appsec\" target=\"_blank\" rel=\"noopener\">PCI DSS 4.0<\/a> globally, demanding transparent vulnerability disclosure and management. This all shouldn\u2019t be surprising \u2013 with thousands of vulnerabilities being recorded quarterly, all it takes is one unpatched hole and tragedy awaits.<\/p><p>So please, take that health check and don\u2019t underestimate your immune system \u2013 when you have those vitamins at hand, why not take them?<\/p><p><em><sup>1<\/sup>The exploited <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-5638\" target=\"_blank\" rel=\"noopener\">vulnerability<\/a> was related to a framework for creating web apps written in Java, enabling threat actors to <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/09\/14\/equifax-hack-the-result-of-patched-vulnerability\/\" target=\"_blank\" rel=\"noopener\">run code remotely<\/a>.<\/em><\/p><p><em><sup>2<\/sup>Please check our website for desktop Linux compatibility.<\/em><\/p><p><em><sup>3<\/sup>Additionally, Linux patch management, as well as operating system vulnerability scanning and patching in macOS, is on the roadmap.<\/em><\/p><p><em>For more information about ESET Vulnerability and Patch Management, please visit our page <a href=\"https:\/\/www.eset.com\/int\/business\/solutions\/vulnerability-patch-management\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p><p><em>Discover how V&amp;PM helps in staying compliant with cyber insurance in our blog <a href=\"https:\/\/www.eset.com\/blog\/business\/how-to-decrease-security-liabilities-for-smbs-look-at-cyber-risks-through-the-eyes-of-an-insurer\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/em><\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 The topic of vulnerabilities remains significant as n [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-92365","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Boosting cyber health: How vulnerability and patch management decrease threat exposure - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Boosting cyber health: How vulnerability and patch management decrease threat exposure - Version 2\" \/>\n<meta property=\"og:description\" content=\"\u00a0 The topic of vulnerabilities remains significant as n [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-16T04:08:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/VAPM_thumb.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Boosting cyber health: How vulnerability and patch management decrease threat exposure\",\"datePublished\":\"2024-10-16T04:08:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/\"},\"wordCount\":1160,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/VAPM_thumb.png\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/10\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/\",\"name\":\"Boosting cyber health: How vulnerability and patch management decrease threat exposure - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/VAPM_thumb.png\",\"datePublished\":\"2024-10-16T04:08:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/VAPM_thumb.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/INT\\\/OG_images\\\/Thumbnails_250x250\\\/VAPM_thumb.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/business\\\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Boosting cyber health: How vulnerability and patch management decrease threat exposure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Boosting cyber health: How vulnerability and patch management decrease threat exposure - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/","og_locale":"zh_HK","og_type":"article","og_title":"Boosting cyber health: How vulnerability and patch management decrease threat exposure - Version 2","og_description":"\u00a0 The topic of vulnerabilities remains significant as n [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/","og_site_name":"Version 2","article_published_time":"2024-10-16T04:08:01+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/VAPM_thumb.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"7 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/10\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Boosting cyber health: How vulnerability and patch management decrease threat exposure","datePublished":"2024-10-16T04:08:01+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/10\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/"},"wordCount":1160,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/VAPM_thumb.png","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"zh-HK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/10\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/","url":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/","name":"Boosting cyber health: How vulnerability and patch management decrease threat exposure - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/VAPM_thumb.png","datePublished":"2024-10-16T04:08:01+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/VAPM_thumb.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/INT\/OG_images\/Thumbnails_250x250\/VAPM_thumb.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/business\/boosting-cyber-health-how-vulnerability-and-patch-management-decrease-threat-exposure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Boosting cyber health: How vulnerability and patch management decrease threat exposure"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-o1L","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=92365"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92365\/revisions"}],"predecessor-version":[{"id":92372,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/92365\/revisions\/92372"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=92365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=92365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=92365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}