Managing cyber-risk across multiple IT environments can be a major challenge. Without the right protection, legacy software in particular can become more exposed to threats. Yet tight budgets leave little wriggle room for IT security decision makers. So what happens if your incumbent security supplier decides to start charging extra to support these end-of-life platforms? Do you downgrade to a cheaper tool offering less protection? Or even consider refreshing the entire endpoint estate to a new operating system?
Fortunately, with Trend Micro, CISOs must make no such trade-offs. Unlike some providers, you get industry leading protection for Windows 7, Windows Server 2008 R2, and Windows SBS 2011 at no extra cost.
Few organisations have been placed under pressure as extreme over the past year as those working in healthcare. In many cases, this has been a catalyst for rapid digital transformation. Yet with healthcare organisations (HCOs) stretched to the limit, security gaps inevitably appear in systems that support life-saving work on the COVID-19 front line.
As 2020 showed, many cyber-criminals have no qualms about disrupting HCOs, and putting lives at risk, in order to extort victims with ransomware and data theft. To find out more on exactly how fast the pandemic is driving cloud adoption, and how well the sector understands its cybersecurity challenges, Trend Micro commissioned a global study of more than 2,500 IT decision makers in 28 countries across several industry sectors, including healthcare.
This past week, the US National Security Agency (NSA) released a rare security advisory urging organisations to patch a list of critical vulnerabilities. The top 25 list detailed the software flaws most frequently being targeted by state-sponsored Chinese operatives. Although most CVEs were published in 2020, a few date back several years.
What does this tell us? That many organisations are still not patching systems promptly enough, even though the result of a major state-sponsored or cybercrime intrusion could be catastrophic. This is where virtual patching can save the day.
Today, open source software powers some of the world’s largest organisations. But that in turn means it is a target for cyber-criminals and nation state actors. As one of the most popular Linux distributions out there, Red Hat Enterprise Linux (RHEL) is well regarded in security circles. Yet when iterations reach end-of-maintenance support, customers must act quickly to protect their servers.
This is where virtual patching capabilities could help to mitigate risk and extend the value of investments in RHEL.