Applying patches may be a basic security principle, but that doesn't mean it's always easy to do in practice.
The ways that we patch our organisations' IT may change over time, but patching - in general - has always been good for security. This blog explains why the NCSC repeats the 'patch your boxes' advice so often, whilst acknowledging the challenges that patching often presents.
Vulnerabilities in technology are always being discovered and in response, vendors regularly issue security updates to plug the gaps. Applying these updates - a process commonly known as patching - closes vulnerabilities before attackers can exploit them. Patching can also fix bugs, add new features, increase stability, and improve look and feel (or other aspects of the user experience).
So patching matters for more than just security reasons. It ensures you're getting most from your IT, and that it's working smoothly with other people and organisations.
For all these reasons, patching remains the single most important thing you can do to secure your technology, and is why applying patches is often described as 'doing the basics'. But although applying patches may be a basic security principle, that doesn't mean it's always easy to do in practice.
There are lots of reasons why your approach to patching can't simply be 'patch all of things, all of the time'. These include:
None of the above are reasons not to patch as much you can, but they do explain why you need to plan your patching regime carefully.
Your approach to patching will depend on what your organisation does, how you approach security, and how much you have to spend.
Security always involves combining different defences, and often making trade-offs, to try and reduce your overall business risk to acceptable levels.
The NCSC's vulnerability management guidance tells you how to get started with creating a patching strategy that works for your organisation by assessing and prioritising vulnerabilities, and the NCSC has further ideas on how to make patching part of your organisation's 'business-as-usual'.
When patching is hard or impossible, this is where your defence-in-depth tactics come to the fore. You can:
All this will help you prevent attacks where you can, and detect, respond and clean up where you can't.
What else helps you and your organisations to manage this tricky security problem well? What else would be useful to you, that you don't have now? We'd like to hear your thoughts and experiences - please share them with us by contacting us online, or letting us know on social media (access to all our social media channels can be found at the top of this page via the icons).
Reporting
Report all Fraud and Cybercrime to Action Fraud by calling 0300 123 2040 or online. Forward suspicious emails to report@phishing.gov.uk. Report SMS scams by forwarding the original message to 7726 (spells SPAM on the keypad).
Click to Open Code Editor