Is Crisis Patch Management Making Your Security Teams WannaCry?2018-03-28T20:45:44+00:00

Is Crisis Patch Management Making Your Security Teams WannaCry?

Industry needs to accept that relying on patches and OS upgrades will not protect enterprises from today’s polymorphic threats, says Bromium

June 1, 2017

CUPERTINO, Calif. — June 1, 2017 — Bromium®, Inc., the pioneer and leader in virtualisation-based enterprise security that stops advanced malware attacks, today announced the findings of an independent survey of 500 CISOs from Germany, UK and US into the cost and frequency of crisis patch management. This research, conducted by Vanson Bourne, shows that companies are struggling to maintain emergency patch cycles, despite the fact enterprise reliance on legacy systems often mean emergency patches are an everyday fact of life.

Key findings of the research show that:

  • Over half (53%) of CISOs say crisis patch management is a major disruption to their IT and security teams
  • Enterprises have to issue an emergency patch on average 5 times per month, with each crisis patch taking an average of 13 man hours to fix
  • 53% of businesses have had to pay overtime, or bring in a third party issues response team, to issue patches or fire-fight a security issue in the past year, at a cost of $19,908 per patch

“We can see with the recent WannaCry outbreak – where an emergency patch was issued to stop the spread of the worm – that enterprises are still having to paper over the cracks in order to secure their systems,” said Simon Crosby, Bromium  CTO and co-founder. “The fact that these patches have to be issued right away can be hugely disruptive to security teams, and often very costly to businesses, but not doing so can have dire consequences. WannaCry certainly isn’t an isolated case and as ransomware and polymorphic malware become increasingly sophisticated and difficult to defend against, we are going to see many more emergency patches become a crisis – although, sadly, they will often be too late.”

Verizon’s recent Data Breach Investigations Report showed there has been a 50% rise in ransomware compared to last year. In addition, a recent Webroot report showed that 97% of malware infections are polymorphic – as such, it is often too late for most to wait around for a patch, even if the organization is fast enough to issue the patch right away.

This issue is compounded by the fact many enterprises are still tied to legacy systems. Windows 7 was reportedly the system that was worst hit by WannaCry and according to Statcounter, it is also the most popular version of Microsoft’s operating system, accounting for almost half (46%) of Windows computers. Yet reasons for failing to upgrade can be multifaceted – further research shows that 40 percent of enterprise software is paid for but sits unused; this is largely because upgrades are often costly, complex, disruptive and in some instances, unachievable, due to application dependencies.

Many security firms have been quick to advise customers about everything from OS upgrades, to better education for users, to putting in more detection capabilities. Still this advice often fails to chime with the reality of running IT for the enterprise.

“WannaCry has certainly shined a spotlight on a problem that has plagued enterprises for years. It is simply impractical to expect enterprise organisations to continually upgrade – even when they have licences, the actual deployment creates huge disruption, or in some instances would require an entire hardware refresh and result in huge upfront capital costs,” Crosby continues. “This is why so many businesses with enterprise agreements that still do not upgrade. We need to accept and understand that enterprises are not in a position to constantly patch and upgrade, and apply security that meets the needs of the real world, not the ideal one. Micro-virtualization, whereby individual web pages, documents and workloads can be performed in isolated containers, is the only practical solution to address this problem.”

About Bromium, Inc.

Bromium protects your brand, data and people using virtualization-based security. We convert an enterprise’s largest liability – endpoints and servers -into its best defense. By combining our patented hardware-enforced containerization to deliver application isolation and control, with a distributed Sensor Network to protect across all major threat vectors and attack types, we stop malware in its tracks. Unlike traditional security technologies, Bromium automatically isolates threats and adapts to new attacks using behavioral analysis and instantly shares threat intelligence to eliminate the impact of malware. Bromium offers defense-grade security and counts a rapidly growing set of Fortune 500 companies and government agencies as customers.

Visit Bromium: https://www.bromium.com
Read the Bromium blog: http://blogs.bromium.com/
Follow Bromium on Twitter: https://twitter.com/bromium
Follow Bromium on LinkedIn: https://www.linkedin.com/company/bromium

MEDIA CONTACT:

United Kingdom
Spark Communications
bromium@sparkcomms.co.uk
+020 7436 0420

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.
Share
Tweet
Share

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close