Search - National Standard Microsite
Back
Cyber Security: Vulnerability management
Cyber Security: Vulnerability management
Status: Live
Published:
11/05/2021
Security level: Official
Amended / Internally developed:
No
Live on platform:
23/09/21
Retired on platform:
Target Audience: Technical / General
Authoring body: National Cyber Security Centre (NCSC)
Grading:
no grading applied
Guidance
Abstract
Step 5 from the 10 steps to Cyber Security covers how to keep your systems protected throughout their lifecycle.
The majority of cyber security incidents are the result of attackers exploiting publicly disclosed vulnerabilities to gain access to systems and networks. Attackers will, often indiscriminately, seek to exploit vulnerabilities as soon as they have been disclosed. So it is important (and essential for any systems that are exploitable from the internet) to install security updates as soon as possible to protect your organisation. Some vulnerabilities may be harder to fix, and a good vulnerability management process will help you understand which ones are most serious and need addressing first.
Download attachments:
Tag:
network
cyber attack
Category:
Devices
Security
Cloud