Cyber Security: Vulnerability management
							Status: Retired
							
						
									
						
							Published: 
							11/05/2021
						
					
						
							Security level: Official
						
					
						
							Amended / Internally developed: 
							False
						
					
						
						    Live on platform: 
							23/09/2021
						
					
						
						    Retired from platform: 
							03/10/2025
						
				
							Target Audience: Technical / General
						
					
						
							Authoring body: National Cyber Security Centre (NCSC)
						
 
				
					
					
					
				    
    
				
					
					
						Grading: 
    						no grading applied
					
					
				
								Guidance
							
						
		
						Abstract
							Step 5 from the 10 steps to Cyber Security covers how to keep your systems protected throughout their lifecycle.
The majority of cyber security incidents are the result of attackers exploiting publicly disclosed vulnerabilities to gain access to systems and networks. Attackers will, often indiscriminately, seek to exploit vulnerabilities as soon as they have been disclosed. So it is important (and essential for any systems that are exploitable from the internet) to install security updates as soon as possible to protect your organisation. Some vulnerabilities may be harder to fix, and a good vulnerability management process will help you understand which ones are most serious and need addressing first.
							
								Download attachments: 
							
							
									
						
					
	
		
			
			
				
					Category:
					
						
						
							
								
									Devices
								
							
								
									Security
								
							
								
									Cloud