{"id":68,"date":"2019-04-24T16:03:42","date_gmt":"2019-04-24T16:03:42","guid":{"rendered":"https:\/\/firwl.qantumthemes.xyz\/installer\/?p=68"},"modified":"2020-06-30T07:48:51","modified_gmt":"2020-06-30T07:48:51","slug":"news-article-9","status":"publish","type":"post","link":"https:\/\/tourabs.com\/index.php\/2019\/04\/24\/news-article-9\/","title":{"rendered":"Prioritization to Prediction: Getting Real About Remediation."},"content":{"rendered":"\n<p class=\"has-drop-cap\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The gallery<\/h3>\n\n\n\n<figure class=\"wp-block-gallery columns-4 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-2504-1170x781.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-2504-1170x781.jpg\" alt=\"\" data-id=\"914\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-2504\/\" class=\"wp-image-914\"\/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-2157-1170x811.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-2157-1170x811.jpg\" alt=\"\" data-id=\"913\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-2157\/\" class=\"wp-image-913\"\/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-775-1170x949.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-775-1170x949.jpg\" alt=\"\" data-id=\"912\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-775\/\" class=\"wp-image-912\"\/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-388-1170x658.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-388-1170x658.jpg\" alt=\"\" data-id=\"911\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-388\/\" class=\"wp-image-911\"\/><\/a><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><a href=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-384-1170x781.jpg\"><img decoding=\"async\" src=\"https:\/\/firwl.qantumthemes.xyz\/installer\/wp-content\/uploads\/2019\/05\/post-384-1170x781.jpg\" alt=\"\" data-id=\"910\" data-link=\"https:\/\/firwl.qantumthemes.xyz\/installer\/post-384\/\" class=\"wp-image-910\"\/><\/a><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p>Most vulnerability scanners will also attempt to log in to systems using default or other credentials in order to build a more detailed picture of the system.<\/p>\n\n\n\n<p>After building up an inventory, the vulnerability scanner checks each item in the inventory against one or more databases of known vulnerabilities to see if any items are subject to any of these vulnerabilities.<\/p>\n\n\n\n<p>The result of a vulnerability scan is a list of all the systems found and identified on the network, highlighting any that have known vulnerabilities that may need attention.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Vulnerability Remediation: 5 Steps Toward Building an Effective Process<\/h3>\n\n\n\n<p><strong>1) Implement a threat monitoring process that will allow your security team to constantly gather information about the newest or emerging threats that may affect your organization<\/strong><\/p>\n\n\n\n<p>It is imperative that your security team stay current on these threats. They do this by reviewing vender notifications of threats, patches and system updates as well as getting information from US CERT, which is always kept up to date with the latest information. Any threats the team uncover need to be addressed by vulnerability remediation management.<\/p>\n\n\n\n<p><strong>2) Conduct regular vulnerability assessments<\/strong><\/p>\n\n\n\n<p>This is not something you do once and forget. Assessment is a continuous process because the assessment is only a point in time snapshot of your situation and can change as new vulnerabilities are discovered. Therefore, you must ensure that you establish a formal program with defined roles and responsibilities that focus on developing and maintaining good vulnerability processes and procedures.<\/p>\n\n\n\n<p><strong>3) Establish and enforce baseline configurations<\/strong><\/p>\n\n\n\n<p>Standardize the configuration of similar technology assets within your organization based on documented configurations in accordance with applicable policies. Your security team must ensure that they document all baseline configurations within your environment and also ensure that these documents are kept up to date and are integrated as part of your system build process and is enforced throughout your organization.<\/p>\n\n\n\n<p><strong>4) Remediate vulnerabilities<\/strong><\/p>\n\n\n\n<p>This is the practice of evaluating the vulnerabilities you have identified, assigning risk to those vulnerabilities, planning responses to the vulnerabilities and then tracking any actions taken towards mitigating the vulnerabilities you find. Discovering faults and doing nothing about them is useless and will leave your organization susceptible to many threats.<\/p>\n\n\n\n<p><strong>5) Patch vulnerabilities<\/strong><\/p>\n\n\n\n<p>Vulnerability and patch management is best conducted in the following manner:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>First you must have processes in place to identify and confirm vulnerabilities using appropriate tools and services that will help you identify suspected or confirmed threat to your organization.<\/li><li>Next you analyze your finding in order to thoroughly understand what the risks are. Without a true understanding, how can you put the correct measure in place to deal with them.<\/li><li>After you perform your analysis, you fix the problems.<\/li><li>Once your \u201cfix\u201d is in place, you must rescan or retest to first ensure your fix took and then to ensure that it was effective.<\/li><\/ul>\n\n\n\n<p>By following these recommendations I have provided you here, you are well on your way to securing your organization again vulnerabilities and threats that can cause serious harm if not checked.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The gallery Most vulnerability scanners will also attempt to log in to systems using default or other credentials in order to build a more detailed picture of the system. After building up an inventory, the vulnerability scanner checks each item in the inventory against one or more databases of known ...<\/p>\n","protected":false},"author":1,"featured_media":1348,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,5],"tags":[8,9,10,11,12,13],"class_list":["post-68","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-globalnews","tag-cyber-security-alert","tag-internet","tag-ransomware","tag-security","tag-trojan","tag-virus"],"_links":{"self":[{"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/posts\/68","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":1,"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/posts\/68\/revisions"}],"predecessor-version":[{"id":1495,"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/posts\/68\/revisions\/1495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/media\/1348"}],"wp:attachment":[{"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/media?parent=68"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/categories?post=68"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tourabs.com\/index.php\/wp-json\/wp\/v2\/tags?post=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}