<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog</title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-au/blog/rss" /><link>https://www.ivanti.com/en-au/blog</link><item><guid isPermaLink="false">c641a17e-53ec-4081-9348-b34fc5d8661b</guid><link>https://www.ivanti.com/en-au/blog/the-secure-by-design-pledge-a-commitment-to-creating-a-safer-digital-future</link><atom:author><atom:name>Jeff Abbott</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/jeffery-abbott</atom:uri></atom:author><category>Security</category><category>Ivanti News</category><title>The Secure-by-Design Pledge: A Commitment to Creating a Safer Digital Future</title><description>&lt;p&gt;The exciting benefits of digital transformation and automation — global interconnectedness, efficient operations, greater business outcomes — have come with an equal measure of concern over digital safety. It has become clear that to safely realize the &lt;em&gt;benefits&lt;/em&gt; of digital acceleration, as an industry we must take bold steps toward securing the digital landscape and mitigating cybersecurity threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;At Ivanti this evolution is already under way — and we are committed to being at the very front of the movement. As a company, we have always believed that our customers’ interests – including security –&amp;nbsp;should be a cornerstone of software development. With the threat landscape rapidly evolving, and tactics becoming increasingly aggressive and sophisticated, the imperative to put security &lt;em&gt;first&lt;/em&gt; has never been greater. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;That is why last month I &lt;a href="https://www.ivanti.com/en-au/blog/our-commitment-to-security-an-open-letter-from-ivanti-ceo-jeff-abbott"&gt;outlined a bold plan&lt;/a&gt; for Ivanti to meet the new reality we are all facing. Our efforts are rooted in Secure by Design principles, weaving security into every stage of our software development lifecycles. Given this commitment, it makes sense that we’re among the first to sign the Cybersecurity and Infrastructure Security Agency’s (CISA) Secure by Design pledge, which they unveiled on May 7, 2024 at the RSA Conference in San Francisco.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The concept of Secure by Design is not new, but it has never been more relevant. It ensures that products are built with security embedded from the ground up, reducing the risk of vulnerabilities and making it more difficult for malicious actors to exploit them. That is why this pledge is so meaningful at this moment in time, and why companies like Ivanti are answering the call.&amp;nbsp; We see this as a meaningful step forward in the industry’s commitment and collaboration around security, and we look forward to setting a new standard for the broader ecosystem. &amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;A bold new level of security&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;By signing the Secure by Design pledge, we are committing to a set of principles, standards, and actions that will help us further elevate the security of our products and better protect our customers. This includes implementing multi-factor authentication, reducing the use of default passwords, mitigating entire classes of vulnerabilities, increasing the adoption of security patches, establishing a vulnerability disclosure policy and improving our customers' ability to gather evidence of cybersecurity intrusions. I’m pleased that our products and our organization already meet many of these Secure by Design principles, and we are looking closely at opportunities to enhance and accelerate our efforts and practices throughout our organization and product development lifecycle.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For Ivanti, these commitments are far from simply words on paper or empty promises. By signing this pledge, we are making a public commitment to raise the bar and that we will be accountable for delivering. We will work diligently over the coming year to make measurable progress toward each of these goals, and we will update our customers and the wider security community on our progress. We believe that transparency is essential in building trust and fostering a broader culture of security.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Stronger together&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;We’ve taken a big step by acting as early signers to this pledge. Still, we recognize that we cannot achieve a safer digital future alone. It is crucial that other vendors in the industry also embrace the principles of Secure by Design and take similar steps to prioritize security in their products. We strongly encourage our peers to join us in signing the CISA Secure by Design pledge and to work collaboratively toward our shared goal of protecting our customers and the broader digital ecosystem.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It's good business, and it’s the right thing to do for employees, partners, customers and the communities we serve.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our recent experience at RSA has only reinforced our belief in the importance of the security community coming together to tackle the challenges we collectively face. Our conversations with customers and partners were invaluable, and they highlighted the need for a collective effort around software security. By sharing knowledge and best practices and holding each other accountable, we can make significant strides toward a stronger and more secure future. &amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ivanti is committed to being a leader in this effort, and we look forward to engaging with our customers and the wider community to make Secure by Design the new reality.&lt;/p&gt;
</description><pubDate>Wed, 08 May 2024 22:06:03 Z</pubDate></item><item><guid isPermaLink="false">5a409b72-808b-4c7b-a71d-b96530e339a6</guid><link>https://www.ivanti.com/en-au/blog/what-is-irap-assessment-what-to-know-about-ivanti-neurons-and-irap</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/david-pickering</atom:uri></atom:author><category>Security</category><title>What is IRAP Assessment? What to Know About the Latest Compliance for Ivanti Neurons</title><description>&lt;p&gt;The Australian Information Security Registered Assessors Program (IRAP) assessment is an essential tool for organisations looking to ensure their security posture meets the highest standards.&lt;/p&gt;

&lt;p&gt;This assessment, which&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-itsm"&gt;Ivanti Neurons for IT Service Management (ITSM)&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/it-asset-management"&gt;Ivanti Neurons for IT Asset Management (ITAM)&lt;/a&gt;&amp;nbsp;went through, is one of the most stringent security assessments available.&lt;/p&gt;

&lt;h2&gt;The IRAP assessment process&lt;/h2&gt;

&lt;p&gt;The IRAP program is administered by the Australian Cyber Security Centre (ACSC), a division of the Australian Signals Directorate. The ACSC is responsible for the security of the Australian government’s information and IT systems, and the IRAP assessment process.&lt;/p&gt;

&lt;p&gt;The rigorous assessment process conducted by an approved IRAP assessor includes assessing existing policies and procedures, conducting vulnerability scans, and reviewing security measures.&lt;/p&gt;

&lt;h2&gt;Ivanti Neurons’ IRAP assessment&lt;/h2&gt;

&lt;p&gt;Under the IRAP assessment, conducted by Aegis9 during the period February to May 2023, using the June 2022 version of the Australian Information Security Manual (ISM) and in line with the ACSC’s Cloud Security Guidance, Ivanti Neurons for ITSM and ITAM were assessed against the requirements to hold, process and communicate Australian government information classified up to and including “PROTECTED.”&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for ITSM and ITAM has been assessed in the following areas:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Protection of government and citizen data&lt;/strong&gt;.&amp;nbsp;Ivanti provides a secure platform for the storage and retrieval of personal and sensitive data.&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Secure access to systems&lt;/strong&gt;.&amp;nbsp;Ivanti uses strong authentication methods and access control measures to ensure that only authorised users can access the system.&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Network and system protection&lt;/strong&gt;.&amp;nbsp;Ivanti provides a robust system for protecting networks and systems from malicious attacks and intrusions.&lt;br&gt;
	&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Security monitoring&lt;/strong&gt;.&amp;nbsp;Ivanti is equipped with advanced security monitoring capabilities, allowing organisations to monitor their systems and networks for any suspicious activity.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In addition to IRAP assessment,&amp;nbsp;Ivanti Neurons also holds certifications&amp;nbsp;from several other leading organisations, including ISO/IEC 27001:2013, GDPR compliance, SOC 2 Type II, HIPAA Compliance, and FedRAMP Certification.&lt;/p&gt;

&lt;h2&gt;What Ivanti’s IRAP assessment means for government agencies and public-sector organisations&lt;/h2&gt;

&lt;p&gt;Federal departments, state agencies&amp;nbsp;and critical infrastructure providers require the highest security standards.&amp;nbsp;The IRAP assessment demonstrates&amp;nbsp;the strong commitment Ivanti has to meeting those strict standards.&lt;/p&gt;

&lt;p&gt;Government agencies are continually striving to increase efficiency and reduce costs. To achieve this, they are frequently turning to cloud computing technologies such as SaaS to provide them with a modern platform that will enhance operational efficiency and reduce IT costs.&lt;/p&gt;

&lt;p&gt;Ivanti Neurons for ITSM/ITAM is an advanced IT Service Management platform and enables government agencies to improve their Service Delivery across 11 ITIL practices, optimise their assets by understanding what they have, and improve the employee experience through the self-service portal and digital experience management.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In addition, using the same IRAP assessment platform, agencies can expand across to other areas such HR, Facilities, Governance Risk and Compliance, Project and Portfolio Management and Security Operations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By using Ivanti Neurons for ITSM/ITAM, organisations&amp;nbsp;can achieve their goals faster, improve employee experience&amp;nbsp;and reduce their risk profile. The comprehensive suite of features offered includes automated processes and analytics capabilities that help minimise manual tasks associated with ensuring service quality.&lt;/p&gt;

&lt;p&gt;This frees up customers to focus on providing superior customer experiences instead of managing complex back-end operations.&lt;/p&gt;

&lt;p&gt;Furthermore, Ivanti Neurons for ITSM is designed to be easily deployable across multiple devices, providing customers with peace of mind that they are using a secure solution from start to finish.&amp;nbsp;Ivanti is committed to assessing more solutions against the IRAP program. Ivanti Neurons for MDM (Mobile Device Management) is currently under IRAP assessment and Ivanti looks forward to sharing the results when complete.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Need additional information? Head over to the &lt;a href="https://www.ivanti.com/en-au/solutions"&gt;Ivanti&amp;nbsp;IRAP page&lt;/a&gt; to learn more.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Sun, 18 Feb 2024 09:24:30 Z</pubDate></item><item><guid isPermaLink="false">5e2bd862-5df7-47f6-af46-8a38ca7881c0</guid><link>https://www.ivanti.com/en-au/blog/november-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>November 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/BLQaT3KTfq0" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;November 2023 Patch Tuesday has arrived and has a lower overall CVE count than previous months, but includes some urgent fixes that organizations will want to take note of. This month is also the first patch cycle for Server 2012 and 2012 R2 extended support (ESU). On the third-party&amp;nbsp;side,&amp;nbsp;Adobe has released updates and an update from Google Chrome Stable Channel has&amp;nbsp;been updated.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/11/patchtues-page-blog_nov2023-2.jpg"&gt;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved 58 new unique CVEs this month, three of which are critical. Three CVEs have confirmed exploits in the wild. There are also some publicly disclosed vulnerabilities that could be considered at higher risk of being exploited. Products affected include Windows OS, Office&amp;nbsp;365, .Net, ASP.NET, Azure DevOps Server, Visual Studio, Exchange Server&amp;nbsp;and&amp;nbsp;SQL Server.&lt;/p&gt;

&lt;p&gt;Microsoft Server 2012 and 2012 R2 officially reached their end-of-life in October. Today, there are updates available for these server editions if an organization has subscribed to Microsoft ESU.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft zero-day ulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability is Windows DWN Core Library (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36033" rel="noopener" target="_blank"&gt;CVE-2023-36033&lt;/a&gt;). The CVE is rated as Important by Microsoft and has a CVSS score of 7.8, but exploits have been detected in the wild.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;There is proof-of-concept code samples publicly&amp;nbsp;available,&amp;nbsp;making it easy for additional attackers to utilize. No user interaction is required to exploit the&amp;nbsp;vulnerability, and if&amp;nbsp;exploited,&amp;nbsp;an attacker could gain&amp;nbsp;system-level&amp;nbsp;privileges. The vulnerability affects all Windows 10, 11&amp;nbsp;and Server editions. Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Cloud Files Mini Filter Driver (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36036" rel="noopener" target="_blank"&gt;CVE-2023-36036&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 7.8, but exploits have been detected in the wild. No user interaction is required to exploit the&amp;nbsp;vulnerability,&amp;nbsp;and if exploited, an attacker could gain&amp;nbsp;system-levelprivileges. The vulnerability affects Windows 10, 11, and Server 2008 and newer server OS editions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Organizations that are still running Server 2008, 2008 R2, 2012 or 2012 R2 should ensure they are subscribing to a Microsoft ESU subscription or take additional precautions to protect these older server editions. Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass vulnerability in Windows SmartScreen (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36025" rel="noopener" target="_blank"&gt;CVE-2023-36025&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 8.8, but exploits have been detected in the wild. An attacker can convince a user to click on a specially crafted URL and bypass Windows Defender SmartScreen checks.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The vulnerability affects Windows 10, 11, and Server 2008 and newer server OS editions. Organizations that are still running Server 2008, 2008 R2, 2012 or 2012 R2 should ensure they are subscribing to a Microsoft ESU subscription or take additional precautions to protect these older server editions.&lt;/p&gt;

&lt;p&gt;Regardless of severity and CVSS&amp;nbsp;rating,&amp;nbsp;this vulnerability is actively being exploited and warrants higher prioritization.&lt;/p&gt;

&lt;h2&gt;Microsoft publicly disclosed vulnerabilities&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a Denial of Server vulnerability in ASP.NET (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36038" rel="noopener" target="_blank"&gt;CVE-2023-36038&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 8.2. The vulnerability has been publicly&amp;nbsp;disclosed,&amp;nbsp;which increases the risk that threat actors may be developing or will develop an exploit. Under the right&amp;nbsp;conditions,&amp;nbsp;an attacker who successfully exploits this vulnerability could cause a total loss of availability.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Office that allows an attacker to bypass the Office Protected&amp;nbsp;View and&amp;nbsp;open in editing mode rather than protected mode (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36413" rel="noopener" target="_blank"&gt;CVE-2023-36413&lt;/a&gt;). The vulnerability is rated as Important and has a CVSS score of 6.5. The vulnerability has been publicly&amp;nbsp;disclosed,&amp;nbsp;which increases the risk that threat actors may be developing or will develop an exploit. The vulnerability affects Microsoft Office and 365 Apps editions.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has updated a previously published CVEs (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38039" rel="noopener" target="_blank"&gt;CVE-2023-38039&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38545" rel="noopener" target="_blank"&gt;CVE-2023-38545&lt;/a&gt;) affecting HTTP headers and SOCKS5 heap buffer overflow to include an updated version of curl&amp;nbsp;8.4.0,&amp;nbsp;which addresses the vulnerabilities. Organizations that implemented the mitigations provided on&amp;nbsp;October 19th, 2023 should follow the guidance provided in the following documentation: &lt;a href="https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/deployment/disable-wdac-policies" rel="noopener" target="_blank"&gt;Remove Windows Defender Application Control (WDAC) policies&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Microsoft Exchange vulnerabilities of note&lt;/h2&gt;

&lt;p&gt;Some of these exchange vulnerabilities&amp;nbsp;&lt;a href="https://www.bleepingcomputer.com/news/microsoft/new-microsoft-exchange-zero-days-allow-rce-data-theft-attacks/" rel="noopener" target="_blank"&gt;caught some recent headlines in early November&amp;nbsp;&lt;/a&gt;because of timing of the disclosures from the researcher not lining up with Microsoft’s release criteria. Some researchers have very hard timeframes, from informing the vendor to releasing details publicly. If the vulnerabilities didn't meet criteria for out-of-band release, then they would fall into the next release cycle. A few of these Exchange CVEs appear to fall into such a case. No exploits or disclosures were reported against the five Exchanges CVEs.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035" rel="noopener" target="_blank"&gt;CVE-2023-36035&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36039" rel="noopener" target="_blank"&gt;CVE-2023-36039&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36050" rel="noopener" target="_blank"&gt;CVE-2023-36050&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36439" rel="noopener" target="_blank"&gt;CVE-2023-36439&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Remote Code Execution Vulnerability&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1730" rel="noopener" target="_blank"&gt;CVE-2021-1730&lt;/a&gt;&amp;nbsp;Microsoft Exchange Server Spoofing Vulnerability (information only change)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party updates&lt;/h2&gt;

&lt;p&gt;Adobe has released updates for 14 products including Adobe Acrobat and Acrobat Reader. Adobe resolved 76 CVEs across the product updates, including 40 Critical CVEs. No exploits or public disclosures have been reported.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Based on Adobe's priorities, these would all fall into their Priority 3 as most of the products are less likely to be targeted (like ColdFusion, InCopy, etc.) Adobe Acrobat and Acrobat Reader is the most likely to be targeted as it is more widely available on systems. Recommendation would be to prioritize&amp;nbsp;&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-54.html" rel="noopener" target="_blank"&gt;APSB23-54&amp;nbsp;: Security update available for Adobe Acrobat and Reader&amp;nbsp;for remediation to be safe&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google Chrome has moved to a &lt;a href="https://security.googleblog.com/2023/08/an-update-on-chrome-security-updates.html" rel="noopener" target="_blank"&gt;weekly release cadence for security updates&lt;/a&gt;. Chrome's stable channel has been updated to 119.0.6045.159 for Mac and Linux and 119.0.6045.159/.160 for Windows and includes 4 CVEs. Expect Chromium-based browsers to update shortly.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 14 Nov 2023 22:18:09 Z</pubDate></item><item><guid isPermaLink="false">059a9b21-6ddf-4d21-9dab-167a76a27543</guid><link>https://www.ivanti.com/en-au/blog/october-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>October 2023 Patch Tuesday</title><description>&lt;p&gt;There's been&amp;nbsp;a long string of zero-day events through September and into the October Patch Tuesday lineup. Apple had five zero-day vulnerabilities across most of their products culminating in their updates that&amp;nbsp;were released&amp;nbsp;on September 26th&amp;nbsp;(which also included the EoL of Big Sur).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Google and Mozilla continued to be busy with several zero-day vulnerabilities in&amp;nbsp;the open-source library, Libwebp. This also impacted chromium-based browsers like Microsoft Edge, Opera and others. For more details on the lineup of CVEs leading up to October Patch&amp;nbsp;Tuesday,&amp;nbsp;check out our&amp;nbsp;&lt;a href="https://www.helpnetsecurity.com/2023/10/06/october-2023-patch-tuesday-forecast/" rel="noopener" target="_blank"&gt;Patch Tuesday Forecast on HelpNetSecurity&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved 104 new CVEs this month, three of which are flagged as exploited. The lineup from Microsoft includes Windows, Office 365, SQL Server, Exchange Server&amp;nbsp;and&amp;nbsp;multiple Azure components. Along with the large lineup of&amp;nbsp;fixes,&amp;nbsp;October also marks the end-of-life for Windows Server 2012 and 2012 R2.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday graphic for October." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/10/patchtues-page-blog_october2023.jpg" /&gt;&lt;/p&gt;

&lt;h2&gt;Microsoft zero-day vulnerabilities&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Skype (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41763" rel="noopener" target="_blank"&gt;CVE-2023-41763&lt;/a&gt;) which allows an attacker to send a specially crafted network call to a target Skype for Business server. The network call could cause the parsing of an http request made to an arbitrary address. This could disclose IP addresses or port numbers or both to the attacker. The CVE is rated as important and has a CVSSv3.1 of 5.3, but proof-of-concept code has been disclosed and there are exploits detected in the wild. This CVE should be treated as a higher severity than Important due to the risk of exploit.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved an&amp;nbsp;information&amp;nbsp;disclosure vulnerability in WordPad (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36563" rel="noopener" target="_blank"&gt;CVE-2023-36563)&lt;/a&gt; which allows the disclosure of NTLM hashes. The CVE is rated as Important and has a CVSSv3.1 of 6.5, but proof-of-concept code has been disclosed and there are exploits detected in the wild. This CVE should be treated as a higher severity than Important due to the risk of exploit.&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved a Denial of Service vulnerability in&amp;nbsp;the HTTP/2&amp;nbsp;protocol (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487" rel="noopener" target="_blank"&gt;CVE-2023-44487&lt;/a&gt;) which allows request cancellation that can reset many streams quickly. The vulnerability has been exploited in the wild since August. The vulnerability has been resolved in the Windows OS and in Visual Studio, .Net and ASP.Net. The CVE&amp;nbsp;doesn't&amp;nbsp;have a CVSS calculated, and Microsoft’s severity is only rated as Important, but due to active exploitation this CVE should be treated as a higher severity.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Windows Server 2012\2012 R2 and Windows 11 21H2 end-of-life&lt;/h2&gt;

&lt;p&gt;This patch Tuesday will include the&amp;nbsp;latest&amp;nbsp;updates for Windows 11 21H2 and Microsoft Server 2012/2012 R2. The later go into Extended Security Support (ESU) starting with a November release, and Microsoft also announced the keys used to&amp;nbsp;&lt;a href="https://learn.microsoft.com/en-us/azure/azure-arc/servers/deliver-extended-security-updates" rel="noopener" target="_blank"&gt;enable&amp;nbsp;these updates&lt;/a&gt; will be managed as part of Azure Arc. They should be released next week.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;End-of-life software poses a risk to an organization. No public updates will be available for these OS versions going forward. For Windows 11&amp;nbsp;users,&amp;nbsp;this means upgrading to a new Windows 11 branch. For Server 2012\2012 R2&amp;nbsp;it'shighly recommended to subscribe to ESU or migrate to a newer server edition.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Linux zero-day vulnerabilities&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;CVE-2023-42115 has a whopping 9.8 CVSS and affects the Exim software solution, a message transfer agent (fancy way of saying email server) that’s very popular on Linux (including web hosters), which&amp;nbsp;wasvulnerable to remote code execution. This vulnerability had been reported for over a year to the original developers but never&amp;nbsp;addressed properly&amp;nbsp;and is now public.&amp;nbsp;There's&amp;nbsp;exploit code available in the wild. It particularly affects servers configured with centralized identity management, including in mixed Windows/Linux environments with Active Directory.&lt;/li&gt;
	&lt;li&gt;Exim announced on October 2nd&amp;nbsp;that a security update for exim-4.96.1 and 4.97 has been created to mitigate this CVE and two other zero-days (with three other zero-days remaining unpatched). Exim is an important MTA software because it’s bundled with “control panel”&amp;nbsp;web hosters, including in docker images.&lt;/li&gt;
	&lt;li&gt;CVE-2023-4863 is a 9.1 CVSS heap-based buffer overflow that affects libwebp, which is a library used by countless applications (for example Google Chrome, Firefox or Brave) to render images on screen.&amp;nbsp;It's beenfound to be vulnerable to an exploit, which is already in the wild, and all the applications using&amp;nbsp;it'll&amp;nbsp;be affected&amp;nbsp;—&amp;nbsp;which are essentially any applications that show or process images in the "webp" format (or its derivatives). This is remotely exploitable and requires no interaction to trigger – simply viewing a malicious image is enough to trigger it.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Linux vulnerabilities can have a long tail, from the publishing of the CVE to patches being made available by Linux distributions. To monitor the latest Linux CVEs,&amp;nbsp;check out &lt;a href="https://cve.tuxcare.com/els/cve" rel="noopener" target="_blank"&gt;TuxCare’s detailed CVE Tracker&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 10 Oct 2023 22:03:02 Z</pubDate></item><item><guid isPermaLink="false">2bd150d5-caf2-45e5-a897-557016003c81</guid><link>https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries</link><category>Security</category><title>International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries</title><description>&lt;p&gt;&lt;em&gt;Part three of a four-part series covering Ivanti’s latest research. Get the full series:&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;Which Gen Is More Tech-Savvy? A Workforce Dilemma&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;Red Flag Reluctance: The Risk to Cybersecurity &lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk"&gt;Taking a Real Look at Hidden Risk&lt;/a&gt; &lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;An organization’s culture and training programs have a significant influence on security preparedness, but our research shows both are inconsistent at the country-to-country level.&lt;/p&gt;

&lt;p&gt;As we’ve seen in the previous posts in this series, &lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;employee demographics&lt;/a&gt; and their &lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;willingness to report security risks&lt;/a&gt; are hidden threats to your cybersecurity posture.&lt;/p&gt;

&lt;p&gt;But &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;new research&lt;/a&gt; from Ivanti shows us there are notable variations between countries in employee beliefs and behaviors regarding cybersecurity. This poses a unique hidden threat to organizations operating in multiple regions.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Get the report&lt;/strong&gt;:&lt;/em&gt; &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;&lt;em&gt;Hidden Threats: How workforce demographics impact your security posture&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Security cultures by country&lt;/h2&gt;

&lt;p&gt;Our research shows important differences in security culture at the country level — both in terms of training provided by the organization and employee-level attitudes. Some examples:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;In Germany, 83% said they would feel safe reporting their mistake to the security team, compared to 61% of employees in Japan.&lt;/li&gt;
	&lt;li&gt;In India, 55% said they believe they have an impact on the company’s cybersecurity efforts, while just 7% said the same in China and 16% said so in France.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;iframe aria-label="Map" data-external="1" frameborder="0" height="440" id="datawrapper-chart-5EKwX" scrolling="no" src="https://datawrapper.dwcdn.net/5EKwX/1/" title="How safe employees feel about reporting security mistakes by country"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Map" data-external="1" frameborder="0" height="430" id="datawrapper-chart-vd63r" scrolling="no" src="https://datawrapper.dwcdn.net/vd63r/1/" title="Belief that individual employees have a security impact"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“These country-level differences are an interesting lens through which to study preparedness. It’s easy — and common — for a security team to judge security based on what’s taking place in their largest or nearest office. Our latest research shows how important it is to explore more granular data and uncover security procedures at every location — whether at headquarters, R&amp;amp;D facilities, supply chain outposts or manufacturing locations.”&lt;/p&gt;

&lt;p&gt;Daren Goesen, SVP, Product Management, Ivanti&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;How local culture interacts with global security programs&lt;/h2&gt;

&lt;p&gt;Culture can influence how organizations defend their assets and people, as well as how they respond to an attack. These challenges include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Employee discomfort with training that was developed at the global level (e.g., poor translation of teaching materials into local language and culture).&lt;/li&gt;
	&lt;li&gt;Employee unease with new standards or rules that have not been “socialized” at the local level.&lt;/li&gt;
	&lt;li&gt;A top-down local office culture that leaves little room for individuals to report errors or concerns.&lt;/li&gt;
	&lt;li&gt;Substandard security support for local offices; for example, employees with questions or concerns must contact a security team member in a different country — and endure language and cultural barriers.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;All these issues can make it easier for malicious actors to disrupt day-to-day operations.&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Map" data-external="1" frameborder="0" height="413" id="datawrapper-chart-XRezN" scrolling="no" src="https://datawrapper.dwcdn.net/XRezN/1/" title="International inconsistencies in security training"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;h2&gt;Why it matters&lt;/h2&gt;

&lt;p&gt;Many organizations have a top-down approach to training and security culture, but the research shows it’s critical to understand local security culture — and even local culture — to put together a coherent plan.&lt;/p&gt;

&lt;p&gt;No matter where they're from, every new hire introduces their own unique vulnerabilities to the organization, intentionally or not. Undertrained employees risk diluting the strength of the overall organization's preparedness.&lt;/p&gt;

&lt;p&gt;To minimize this risk, organizations &lt;em&gt;must invest in strong onboarding and ongoing security training programs&lt;/em&gt; at global and regional levels.&lt;/p&gt;

&lt;p&gt;In our &lt;a href="https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk"&gt;next post in this series&lt;/a&gt;, we’ll detail this and other effective measures an organization can take to address the hidden threats we’ve explored.&lt;/p&gt;
</description><pubDate>Tue, 03 Oct 2023 04:02:00 Z</pubDate></item><item><guid isPermaLink="false">4385fda4-67d7-403a-afef-3ff7a208578a</guid><link>https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk</link><category>Security</category><title>Taking a Real Look at Hidden Risk</title><description>&lt;p&gt;&lt;em&gt;Part four of a four-part series covering Ivanti’s latest research. Get the full series: &lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;Which Gen Is More Tech-Savvy? A Workforce Dilemma&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;Red Flag Reluctance: The Risk to Cybersecurity&lt;/a&gt; &lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries &lt;/a&gt; &lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Big-picture excellence can hide pockets of risk. It’s time to explore security risk in detail — drilling down to look at vulnerabilities hidden in the data and by taking preventative action.&lt;/p&gt;

&lt;p&gt;As the previous posts in this series have shown, &lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;employee demographics&lt;/a&gt;, their &lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;willingness to report security risks&lt;/a&gt; and &lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;country-to-country security culture&lt;/a&gt; differences pose hidden threats to your company’s cybersecurity efforts. They’re threats that have been uncovered in &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;new research&lt;/a&gt; from Ivanti.&lt;/p&gt;

&lt;p&gt;It’s up to an organization to take concrete steps to mitigate these threats. What are some of the key measures you can take?&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Get the report&lt;/strong&gt;:&lt;/em&gt; &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;&lt;em&gt;Hidden Threats: How workforce demographics impact your security posture&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Survey your employees to uncover demographic propensities&lt;/h2&gt;

&lt;p&gt;Use an anonymous survey to surface insights about your employee base — paying close attention to demographic differences.&lt;/p&gt;

&lt;p&gt;Are there unexpected findings? Conclusions that run counter to expectations? Use the findings to step up your training and outreach efforts, matching solutions to the segments of your employee base that need additional support.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Sample questions for an anonymous study of employee attitudes&lt;/strong&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Can you identify a phishing attempt?&lt;/li&gt;
	&lt;li&gt;Have you been given resources and/or tools to identify a phishing attempt?&lt;/li&gt;
	&lt;li&gt;Do you feel comfortable asking the security team a question?&lt;/li&gt;
	&lt;li&gt;Do you feel safe reporting an error to the security team?&lt;/li&gt;
	&lt;li&gt;Do you think your actions have an impact on the organization’s security?&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Challenge stereotypes about digital savviness and safety&lt;/h2&gt;

&lt;p&gt;Have your security team complete an anonymous survey that examines their assumptions about different employee groups. Do they believe older employees act less safely? How do those results compare to your general employee survey findings?&lt;/p&gt;

&lt;p&gt;Try to shed light on assumptions that are not only unfair but untrue — and on how stereotypes might affect your security readiness.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Part of understanding chronic repeat [phishing] clickers should involve a bit of investigation. In an organization of 5,000 people, it could be that there are certain roles that naturally encourage people to click even when your awareness program and other training discourages it. I’m thinking about departments that are constantly understaffed, departments whose job it is to process large amounts of email (e.g., recruiting), etc. Before anyone blames the end user, an organization should try to see if they are accidentally putting certain sets of users in no-win situations.”&lt;/p&gt;

&lt;p&gt;- &lt;a href="https://www.reddit.com/r/cybersecurity/comments/10g4688/comment/j55k4cn/" rel="noopener" target="_blank"&gt;Reddit comment&lt;/a&gt; on why some employees are more likely to fall for phishing emails&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Understand how global security culture is translated into local languages and culture&lt;/h2&gt;

&lt;p&gt;When developing any new training and guidelines or deploying new security technology, make certain to consult with local divisions to gain their input and buy-in. Simply translating educational materials and communications is not enough.&lt;/p&gt;

&lt;p&gt;Solicit feedback from local offices about how well these programs “translate” to regional offices and the challenges they may encounter. Where possible, design materials that are culturally sensitive and appropriate for local offices.&lt;/p&gt;

&lt;h2&gt;Design the tech stack to minimize pockets of nonconformity and inconsistency&lt;/h2&gt;

&lt;p&gt;Rather than relying on individual users to conform to security protocols, build stronger back-end automation that is effectively hidden from end users — interventions that make compliance frictionless. For example:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Just-in-time software updates&lt;/em&gt;: Most employees don’t relish shutting down their computers and rebooting for software updates, so they tend to postpone the process indefinitely. Instead, use a system that forces a restart within 72 hours; this way, employees have some control over when the reboot takes place, even while enforcing needed updates.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;No-stress password hygiene&lt;/em&gt;: Instead of asking employees to update passwords on a regular schedule, implement a technology that allows users to access two-factor password apps — no remembering or sticky notes needed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Address how to build an open and welcoming security culture&lt;/h2&gt;

&lt;p&gt;It should be a culture in which there are no barriers to contacting security professionals, no matter how small the question or concern or how foolish the mistake is.&lt;/p&gt;

&lt;p&gt;What are the key tenets of a strong security culture?&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Open&lt;/em&gt;: Employees feel safe reporting an incident and are rewarded for their honesty and transparency. They feel comfortable approaching the security team no matter how trivial their question or concern may seem.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Iterative:&lt;/em&gt; The organization provides frequent, iterative training that’s compelling to employees. In between formal sessions, IT uses various tactics to keep security top of mind – from gamified security contests to lunchtime workshops.&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;Designed&lt;/em&gt;: Employee behavior is sharpened by tech-driven behavioral interventions. They are designed so well that they eliminate dreaded workarounds and non-compliance. As one security expert explained,&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;“Repeat clickers aren’t really the problem, or more accurately, they’re a relatively predictable problem. If you know someone has a hard time detecting deception, they need guardrails, not punitive measures or more ineffective training.”&lt;/p&gt;

&lt;p&gt;Comment from the &lt;a href="https://www.reddit.com/r/cybersecurity/comments/13csxs0/what_does_your_policytraining_look_like_for/" rel="noopener" target="_blank"&gt;r/cybersecurity Reddit forum&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;Integrated&lt;/em&gt;: The responsibility for security is shared by all, and your employees are invested in keeping the organization safe.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 03 Oct 2023 04:01:02 Z</pubDate></item><item><guid isPermaLink="false">7ee84b27-916e-435d-a2db-52525c9bfb38</guid><link>https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma</link><category>Security</category><title>Which Gen Is Most Tech-Savvy? A Workforce Dilemma</title><description>&lt;p&gt;&lt;em&gt;Part one of a four-part series covering Ivanti’s latest research. Get the full series:&lt;/em&gt;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;Red Flag Reluctance: The Risk to Cybersecurity&amp;nbsp;&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries&amp;nbsp;&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk"&gt;Taking a Real Look at Hidden Risk&amp;nbsp;&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;According to new cybersecurity research by Ivanti, the employees who are the most tech-savvy aren’t necessarily the ones we’d presume, demographically speaking. Why is that? And what are the issues it creates for an enterprise?&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For a &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;new report&lt;/a&gt;, Ivanti surveyed 6,500 executive leaders, cybersecurity professionals and office workers across the globe to get a better understanding of:&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Employees’ attitudes toward cybersecurity and their perceived role in defending organizations.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Security professionals’ diagnoses of key challenges and vulnerabilities.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Leaders’ tech behaviors, as well as their level of buy-in to cybersecurity strategy.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Some of the results were, in a word, surprising. And that starts with what we’ll examine in this first article in a four-part series about the hidden threats facing even those organizations that have solid cybersecurity programs in place.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Get the report:&lt;/em&gt;&lt;/strong&gt; &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;&lt;em&gt;Hidden Threats: How workforce demographics impact your security posture&amp;nbsp;&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;The opposite of expectations&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Many assume older employees are less tech savvy — and therefore more likely to engage in risky behaviors. In fact, our research found that the opposite is true.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Younger professionals (those under 40) are significantly more likely to disregard important security guidelines compared to Gen X and older. This is true about performing password hygiene, clicking on phishing links and sharing devices with family and friends.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Split Bars" data-external="1" frameborder="0" height="162" id="datawrapper-chart-Q3hMH" scrolling="no" src="https://datawrapper.dwcdn.net/Q3hMH/2/" title="Younger workers display riskier behaviors"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Grouped Bars" data-external="1" frameborder="0" height="426" id="datawrapper-chart-YVJ54" scrolling="no" src="https://datawrapper.dwcdn.net/YVJ54/2/" title="Younger workers are more likely to use unsafe password practices"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;h2&gt;Why it matters&lt;/h2&gt;

&lt;p&gt;These oversights, lapses and shortcuts add up to significantly higher security vulnerabilities with&amp;nbsp;younger employees.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Stereotypes about age-based tech savviness may be leading organizations astray. And the problem isn't only related to cyberhygiene (e.g., password habits, sharing devices); the research shows younger professionals are also less likely to report red flags when they encounter them.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Among those 40 and under, 77% said they reported the last phishing email or message they received, compared to 88% of those over 40. The most common reason for not reporting? “I didn’t think reporting was important.”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Multiple Donuts" data-external="1" frameborder="0" height="399" id="datawrapper-chart-EBG5m" scrolling="no" src="https://datawrapper.dwcdn.net/EBG5m/1/" title="Reported their last phishing email/message to the security team"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;Stereotypes about older workers are particularly insidious because tech workers skew younger — and so may be more likely to believe their older colleagues are uninformed or vulnerable.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For example, &lt;a href="https://www.cwjobs.co.uk/advice/ageism-in-tech-press-release" rel="noopener" target="_blank"&gt;a&amp;nbsp;study of 2,250 professionals in the UK&lt;/a&gt;&amp;nbsp;found tech workers viewed colleagues as “over the hill” and “too old for their job” when they reached 38 years old.&amp;nbsp;(Keep in mind, this is in relation to their tech industry peers, not average employees, who are less likely to be tech savvy.)&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Solution? Automate cybersecurity “savvy”&lt;/h2&gt;

&lt;p&gt;These&amp;nbsp;findings&amp;nbsp;underline&amp;nbsp;why&amp;nbsp;organizations&amp;nbsp;need&amp;nbsp;to&amp;nbsp;rely&amp;nbsp;less&amp;nbsp;on&amp;nbsp;employees’&amp;nbsp;individual judgment and more on&amp;nbsp;tech&amp;nbsp;interventions that&amp;nbsp;make&amp;nbsp;rule-following&amp;nbsp;effortless.&lt;/p&gt;

&lt;p&gt;Even better: deploy automations that run behind the scenes such that your end users aren’t even aware they exist.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“Assuming that younger employees are more security-conscious and tech-savvy is outdated and even dangerous. Organizations should road test these assumptions by conducting internal research that captures their own employees' attitudes about security risk and their part in managing it.”&lt;/p&gt;

&lt;p&gt;Daniel Spicer, Chief Security Officer,&amp;nbsp;Ivanti&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity"&gt;next post in this series&lt;/a&gt;, we’ll examine the hidden threat that comes from employee reluctance to raise red flags about cybersecurity dangers.&lt;/p&gt;
</description><pubDate>Tue, 03 Oct 2023 04:01:01 Z</pubDate></item><item><guid isPermaLink="false">bf4a175a-1041-4701-b76a-9f46903440c5</guid><link>https://www.ivanti.com/en-au/blog/red-flag-reluctance-the-risk-to-cybersecurity</link><category>Security</category><title>Red Flag Reluctance: The Risk to Cybersecurity</title><description>&lt;p&gt;&lt;em&gt;Part two of a four-part series covering Ivanti’s latest research. Get the full series:&lt;/em&gt; &amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;Which Gen Is Most Tech-Savvy? A Workforce Dilemma&lt;/a&gt;&amp;nbsp;&lt;/em&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;&lt;em&gt;International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries &lt;/em&gt;&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;em&gt;&lt;a href="https://www.ivanti.com/en-au/blog/taking-a-real-look-at-hidden-risk"&gt;Taking a Real Look at Hidden Risk&lt;/a&gt;&amp;nbsp;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Keeping an organization safe means getting near-real-time information about security incidents or breaches.&amp;nbsp; But new research shows some employees are less inclined than others to report red ﬂags, which puts your business at risk.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Will your employees get in touch quickly if they have a security concern? Again, it’s dangerous to assume they’ll take action even when they understand the potential risk to their organization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In the &lt;a href="https://www.ivanti.com/en-au/blog/which-gen-is-most-tech-savvy-a-workforce-dilemma"&gt;first post in this series&lt;/a&gt;, we looked at the hidden cybersecurity threat created by employee demographics and dangerous presumptions companies make about them.&amp;nbsp;In this article, we’ll see what &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;new research&lt;/a&gt; from Ivanti reveals about the reluctance of some workers to raise red flags, even about very critical threats.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Get the report&lt;/strong&gt;: &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/resources/v/doc/ivi/2793/19c738c77306"&gt;Hidden Threats: How workforce demographics impact your security posture&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;h2&gt;What groups are less likely to raise alarms?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti’s research, involving a survey of 6,500 executive leaders, cybersecurity professionals&amp;nbsp;and office workers worldwide, shows specific segments of your employee base may hesitate to reach out to alert your cybersecurity team about issues.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This is something any organization should be aware of as it develops outreach and training programs for its employees. So what are the groups that are more likely and less likely to raise red flags?&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Seniority&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The biggest swing variable in reporting issues is seniority. Seventy-two percent of leaders we surveyed say they’ve contacted a cybersecurity employee with a question or concern, compared to just 28% of office workers.&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;Did you know?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Executives are twice as likely to report security interactions as "awkward" or "embarrassing" than office workers. These more frequent, yet negative security interactions may accelerate executives' use of external, non-approved tech support – reportedly at four times the rate of office workers.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;Gender&lt;/h3&gt;

&lt;p&gt;Women are less likely than men to do the same. Twenty-eight percent have contacted a cybersecurity employee with a question or concern, compared to 36% of men.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Bar Chart" data-external="1" frameborder="0" height="216" id="datawrapper-chart-By4dQ" scrolling="no" src="https://datawrapper.dwcdn.net/By4dQ/1/" title="Willingness to contact security varies by gender and seniority"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;h3&gt;Region&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Willingness to contact security varies greatly by country. For example, nearly half of office workers in China have contacted the security team with a question or concern, compared to just 20% in Australia.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Map" data-external="1" frameborder="0" height="396" id="datawrapper-chart-XBqBs" scrolling="no" src="https://datawrapper.dwcdn.net/XBqBs/1/" title="Willingness to contact security varies greatly by country."&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;h2&gt;Why it matters&lt;/h2&gt;

&lt;p&gt;Your security position depends on hundreds or thousands of employees playing defense. Do your employees know they’re valuable members of the extended security team?&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Our security preparedness study asked security professionals about their biggest industry-wide vulnerabilities. Ransomware and phishing ranked number one and two.&amp;nbsp; And these threats are becoming more dangerous with each passing year due to advances in &lt;a href="https://www.wsj.com/articles/ai-is-generating-security-risks-faster-than-companies-can-keep-up-a2bdedd4" rel="noopener" target="_blank"&gt;generative AI&lt;/a&gt;, which make phishing harder to spot.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;iframe aria-label="Stacked Bars" data-external="1" frameborder="0" height="245" id="datawrapper-chart-DOuP3" scrolling="no" src="https://datawrapper.dwcdn.net/DOuP3/1/" title="Ransomware and phishing are the top two biggest security threats, according to security professionals"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;!function(){"use strict";window.addEventListener("message",(function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r=0;r&lt;e.length;r++)if(e[r].contentWindow===a.source){var i=a.data["datawrapper-height"][t]+"px";e[r].style.height=i}}}))}();
&lt;/script&gt;&lt;/p&gt;

&lt;p&gt;All this means your employees &lt;em&gt;need to feel&lt;/em&gt; comfortable approaching IT and security — even if the only “proof” they have of an incoming attack is a nagging doubt. (Some examples: an atypical wire transfer request, a suspicious invoice reminder, or an unsolicited password reset link.) During an active security incident, speed is the single most important factor in defending against an attack.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When employers conduct sentiment surveys to understand employee attitudes, they should drill down to investigate demographic patterns and vulnerabilities. These insights are key to improving overall security preparedness.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“We’ve experienced a few advanced phishing attempts, and the employees were totally unaware they were being targeted. These types of attacks have become so much more sophisticated in the last two years — even our most experienced staff are falling for it..”&amp;nbsp;&lt;/p&gt;

&lt;p&gt;— Ivanti survey respondent&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In our &lt;a href="https://www.ivanti.com/en-au/blog/international-inconsistencies-how-cybersecurity-preparedness-varies-across-countries"&gt;next post in this series&lt;/a&gt;, we’ll dig into the matter of geography. For a large or multinational organization, it’s vital to understand how employee cybersecurity beliefs and behaviors vary – sometimes considerably – by country.&amp;nbsp;&lt;/p&gt;
</description><pubDate>Tue, 03 Oct 2023 04:01:01 Z</pubDate></item><item><guid isPermaLink="false">9c753f4a-e211-48e7-b266-4b6b926ddfa9</guid><link>https://www.ivanti.com/en-au/blog/september-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><category>Security</category><title>September 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/YAaxvXFaWZw" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;September 2023 Patch Tuesday has a lot of activity. The theme this month:&amp;nbsp;"Everyone has a zero-day release!"&lt;/p&gt;

&lt;p&gt;Microsoft has resolved 63 total vulnerabilities including two exploited zero-days (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank" title="https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-36761"&gt;CVE-2023-36761&lt;/a&gt; and &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank" title="https://msrc.microsoft.com/update-guide/vulnerability/cve-2023-36802"&gt;CVE-2023-36802&lt;/a&gt;). Google Chrome resolved one zero-day vulnerability (&lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank" title="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html"&gt;CVE-2023-4863&lt;/a&gt;) on September 11, which is also included in the Microsoft Edge Chromium release. Adobe resolved a zero-day vulnerability in Acrobat and Reader (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html" rel="noopener" target="_blank" title="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html"&gt;APSB23-34 CVE-2023-26369&lt;/a&gt;) on September 12. Apple resolved two zero-days on September 7 (&lt;a href="https://support.apple.com/en-us/106361" rel="noopener" target="_blank" title="https://support.apple.com/en-us/ht213905"&gt;CVE-2023-41064 and CVE-2023-41061&lt;/a&gt;). There aren’t any recent zero-day vulnerabilities on the Linux side, but there are three recent vulnerabilities that are affecting some core capabilities in the Linux Kernel that warrant some attention.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved a total of 63 vulnerabilities this month, including two exploited vulnerabilities. The zero-day vulnerabilities are in Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank"&gt;CVE-2023-36761&lt;/a&gt;) and the Windows OS (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank"&gt;CVE-2023-36802&lt;/a&gt;). Microsoft Edge (Chromium) should be releasing shortly and will include a fix for the Chrome zero-day &lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank"&gt;CVE-2023-4863&lt;/a&gt;. &amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Microsoft has resolved an Information Disclosure vulnerability in Word (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36761" rel="noopener" target="_blank"&gt;CVE-2023-36761&lt;/a&gt;) that has been exploited in the wild. The vulnerability is only rated as Important by Microsoft and has a CVSSv3.1 score of 6.2, but the confirmed exploitation should raise this on your priority list. The Preview Pane can also be used as an attack vector, making it easier to target users to exploit the vulnerability. If exploited, the attacker could gain access to NTLM hashes.&lt;/li&gt;
	&lt;li&gt;Microsoft has resolved an Elevation of Privilege vulnerability in the Microsoft Streaming Service Proxy (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36802" rel="noopener" target="_blank"&gt;CVE-2023-36802&lt;/a&gt;). The vulnerability is only rated as Important by Microsoft and has a CVSSv3.1 score of 7.8, but the confirmed exploitation should raise this on your priority list. If exploited the attacker could gain SYSTEM privileges on the target system.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Third-party update&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Google has resolved a Critical heap buffer overflow vulnerability in the Chrome browser (&lt;a href="https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html" rel="noopener" target="_blank"&gt;CVE-2023-4863&lt;/a&gt;). Google is aware that an exploit for CVE-2023-4863 exists in the wild. Windows instances should update to 116.0.5845.187/.188 and for MacOS and Linux 116.0.5845.187.&lt;/li&gt;
	&lt;li&gt;Adobe Acrobat and Reader released &lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-34.html" rel="noopener" target="_blank"&gt;APSB23-34&lt;/a&gt;, resolving one critical vulnerability (CVE-2023-26369) that is confirmed to be exploited in the wild. The vulnerability is an out-of-bounds write vulnerability that could allow an attacker to execute arbitrary code.&lt;/li&gt;
	&lt;li&gt;Mozilla has released updates for Firefox and Firefox ESR. No zero-days, just a decent lineup of CVEs resolved.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Linux update&lt;/h2&gt;

&lt;p&gt;There are three CVEs of note on the Linux platforms:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;CVE-2023-3111 is a use after free vulnerability in btrfs in the Linux Kernel affecting all versions of Linux. A use after free vulnerability could allow an attacker to leak data from memory, overwrite critical information, execute arbitrary code and bypass Address Space Layout Randomization (ASLR).&lt;/li&gt;
	&lt;li&gt;CVE-2023-3390 is a vulnerability in the Linux Kernel’s nftables API in the netfilter subsystem that could allow privilege escalation. The vulnerability affects Debian and Ubuntu.&lt;/li&gt;
	&lt;li&gt;CVE-2023-35001 is an out of bounds read\write vulnerability in nftables. These types of vulnerabilities can cause a crash, data corruption, code execution, or allow attackers to read sensitive information from other memory locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The changes affect two commonly used components in the Linux Kernel. These components are also used by a variety of solutions from Firewalls to SANs and could affect foundational capabilities.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Btrfs is the filesystem utilized by most Enterprise Linux distributions (Ubuntu, Debian, Redhat, etc.).&lt;/li&gt;
	&lt;li&gt;Nftables is used by any modern firewall solution. Regardless of distribution, it will either be built in through the system itself or third-party applications it will use. The component provides high-performance packet inspection and routing. &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;None of the vulnerabilities are currently exploited so there is time, but you should take advantage to ensure you are testing the changes across your environment adequately.&lt;/p&gt;

&lt;p&gt;Linux vulnerabilities can have a long tail from publishing of the CVE to patches being made available by Linux distributions. To monitor the latest Linux CVEs,&amp;nbsp;&lt;a href="https://cve.tuxcare.com/els/cve" rel="noopener" target="_blank"&gt;check out TuxCare’s detailed CVE Tracker&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;Apple update&lt;/h2&gt;

&lt;p&gt;Apple released updates resolving two exploited vulnerabilities on September 7. The updates affect iOS, iPadOS and macOS. The two CVEs have confirmed exploits in the wild and &lt;a href="https://www.cisa.gov/news-events/alerts/2023/09/11/cisa-adds-two-known-vulnerabilities-catalog" rel="noopener" target="_blank"&gt;CISA has updated the KEV list&lt;/a&gt; adding these two vulnerabilities.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://support.apple.com/en-us/106361" rel="noopener" target="_blank"&gt;CVE-2023-41061&lt;/a&gt; is a vulnerability in Apple Wallet affecting iPhone and iPad. The vulnerability allows an attacker to create a specially crafted attachment which could allow them to execute arbitrary code.&lt;/li&gt;
	&lt;li&gt;CVE-2023-41064 is a vulnerability in Apple ImageIO affecting iPhone, iPad and macOS. The vulnerability could be used to craft a malicious image which would allow an attacker to execute arbitrary code when processed.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Update priorities for September&lt;/h2&gt;

&lt;p&gt;Windows OS, macOS, iPhone, iPad, all browsers and Adobe Acrobat and Reader. Which pretty much feels like everything.&lt;/p&gt;
</description><pubDate>Tue, 12 Sep 2023 21:17:26 Z</pubDate></item><item><guid isPermaLink="false">653ac58a-5eda-4a93-8d8d-5405a04a4173</guid><link>https://www.ivanti.com/en-au/blog/itam-vs-itsm-vs-itom</link><category>Service Management</category><title>ITAM vs. ITSM vs. ITOM: What's the difference?</title><description>&lt;p&gt;IT asset management (ITAM) and IT service management (ITSM) are critical for any organization that requires IT capabilities to support business objectives. Both technologies provide IT operational support to an organization, but the nature and objectives of these technologies are quite different.&lt;br&gt;
&lt;br&gt;
Further, these processes are different than&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/itom"&gt;ITOM, or IT operations management,&lt;/a&gt; which encompasses managing the operations of an IT infrastructure and involves the monitoring, troubleshooting and maintenance of IT systems, applications and services.&lt;br&gt;
&lt;br&gt;
Here, we will explore the differences and similarities between&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/itam"&gt;ITAM&lt;/a&gt; and&amp;nbsp;&lt;a href="https://www.ivanti.com/glossary/itsm"&gt;ITSM&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;ITAM – IT asset management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;An “IT asset” refers to both hardware and software that an organization uses to support its business objectives. When organizations have accurate IT asset inventory reports, they’re able to make informed IT purchase decisions. However, IT assets are often updated, moved and refreshed, making it difficult to maintain up-to-date asset information.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When IT asset reports are inaccurate, they expose the organization to unnecessary IT purchases, software audits and security breaches. ITAM provides recommendations and best practices for managing IT assets that support the organization’s objectives. So a short definition would be:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;IT asset management involves accounting for, deploying, maintaining, upgrading and disposing of an organization's IT assets as needed. In essence, it's ensuring that all these assets, whether tangible or intangible, are being properly tracked and utilized within the organization.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-au/products/it-asset-management"&gt;IT asset management (ITAM)&lt;/a&gt; best practices suggest that an IT asset be linked to its associated contractual and financial information so that organizations can track the overall costs associated with their IT assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Furthermore, ITAM provides guidance to IT asset managers on creating standards, processes, policies and measurements to increase control. This ensures compliance with business objectives and reduces risk, along with containing or reducing costs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When ITAM practices are implemented, IT assets will be tracked from purchase to disposal; often called &lt;a href="https://www.ivanti.com/en-au/en-au/en-au/use-cases/it-asset-lifecycle-management"&gt;IT asset lifecycle management&lt;/a&gt;. For example, an ITAM hardware disposal process will ensure that when old laptops are disposed of during a refresh, the associated software licenses are properly harvested so they can be redeployed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;According to Gartner, &lt;a href="https://www.gartner.com/en/information-technology/glossary/it-asset-management-itam" rel="noopener" target="_blank"&gt;IT asset management (ITAM) provides&lt;/a&gt; an accurate account of technology asset lifecycle costs and risks to maximize the business value of technology strategy, architecture, funding, contractual and sourcing decisions.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Other aspects of ITAM&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;To ensure efficient IT asset lifecycle management, ITAM business practices include processes for IT asset requests, approvals, procurement, disposal and redeployment. These processes ensure that IT assets are documented when purchased and properly tracked as they’re deployed and redeployed.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In looking at ITAM vs. ITSM, it’s important to remember that most IT service management (ITSM) solutions provide capabilities that support IT requests and approvals. So it’s important that ITAM solutions selected by an organization integrate with the organization’s ITSM solution.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It's also important to note that most comprehensive ITAM solutions offered by software vendors provide processes that span multiple departments of an organization. This means that most IT asset management solutions are selected and owned by business executives, not IT managers.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;ITSM – IT service management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Organizations that require IT assets to support business objectives also require IT services to ensure assets are properly working in the role for which they were purchased. &lt;a href="https://www.ivanti.com/en-au/products/ivanti-neurons-itsm"&gt;IT service management (ITSM)&lt;/a&gt; is &lt;em&gt;not&lt;/em&gt; just about software tools; it’s also about processes, people and technology. ITSM software is a component of the overall ITSM solution, one we can define as:&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;IT service management is a strategic approach for designing, delivering, managing and improving the way you use information technology (IT) within an organization. The goal of IT service management is to ensure that the right processes, people and technology are in place so that the organization can meet its business goals.&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;ITSM software solutions come with several components such as a database, business objects (users, groups, roles, etc.) and a process engine. Most ITSM solutions offered by vendors today follow industry&amp;nbsp;best practices.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;ITOM – IT operations&amp;nbsp;management&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;ITOM differs from ITAM or ITSM in that it covers a wide range of activities, from managing the physical hardware to managing the software and applications that run on it. It also involves ensuring the security and availability of IT systems. The ultimate goals of ITOM are to optimize the performance and efficiency of IT systems and to ensure they meet the needs of the organization. ITOM also ensures that IT systems comply with industry standards and best practices.&lt;/p&gt;

&lt;h2&gt;Industry best practices&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Another aspect of the ITAM vs. ITSM backstory is that as IT solutions became more widely adopted, a need grew for industry standards. These standards were necessary to define common terminology and establish best practices.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;ITAM subscribes to the best practices of the International Association of Information Technology Asset Management (IAITAM), adding a layer of professional insight across its capabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Originally, ITSM was aligned only with the IT Infrastructure Library (ITIL). However, it has since expanded to include other standards such as ISO2000, VeriSM&amp;nbsp;and IT4IT.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;In terms of compliance processes, ISO 20000 is more stringent and authoritative than ITIL. ITIL, on the other hand, is a set of recommended best practices that organizations can choose to implement to varying degrees, according to their needs and preferences.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;VeriSM&amp;nbsp;is a service management approach for the digital age that helps service providers create a flexible operating model to meet desired business outcomes.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The IT4IT Reference Architecture standard consists of the IT Value Chain and a three-layer reference architecture. The IT Value Chain comprises the four IT value streams, which play a vital role in helping IT control the service model as it advances through its lifecycle.&lt;/p&gt;

&lt;p&gt;All these standards have overlaps across all aspects of best practices while looking at them from slightly different angles.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To help IT service employees stay up to date and educated, each of these industry best practices offers certification and training. These certifications emphasize practical skills and procedures rather than specific products.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;These software solutions are typically designed to meet most, if not all, of these industry recommendations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Organizations like Pink Elephant exist to evaluate ITSM software solutions and certify them against industry standards. If you plan to implement best practices, choosing certified ITSM tools is advisable.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;CMDB or ITAM?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Another point to understand in looking at ITAM vs. ITSM? Comprehensive ITSM solutions offer configuration management capabilities along with a &lt;a href="https://www.ivanti.com/glossary/cmdb"&gt;configuration management database (CMDB)&lt;/a&gt; to support and manage IT assets that provide services to the organization.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Both&lt;/em&gt; ITAM and ITSM provide guidance for managing IT assets, which can be confusing until you explore the objectives of each practice.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;ITAM objectives focus on managing an IT asset’s overall cost, including ownership, associated contracts with asset lifecycle, warranty and refresh information. ITAM focuses on IT assets from an organization’s financial perspective.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;An ITSM’s configuration management objectives look at IT assets from an operational and support perspective. Asset availability and stability impact an organization’s day-to-day operations, so assets need to be documented along with their configuration and service offerings.&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Can you use a CMDB for ITAM?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;To answer this question, let’s take a look at how airlines manage their flights. Airlines manage their flights using a database with flight numbers that describe a service. A separate asset database maintains inventory information listing the physical aircraft, along with relevant maintenance information.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When a problem is found with an aircraft, the airline will sometimes swap the aircraft for another. Because they maintain services and equipment in different databases, the airline can switch out the aircraft without having to change the flight number.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Much as it wouldn’t be practical for this airline to manage its flight services in the same database they use to manage its aircraft inventory, it’s not practical to use a CMDB for both ITAM and Configuration Management.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Most IT assets are refreshed every 3–4 years, while IT configurations with supporting assets are maintained and updated, not replaced. Therefore, you should use a CMDB to maintain and manage the lifecycle of a service while pulling the supporting assets from an IT asset management database.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Summary: ITAM vs. ITSM is really ITAM + ITSM&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;ITAM and ITSM are both critical for any organization that uses IT assets to support business objectives. In considering ITAM vs. ITSM, it’s really not a matter of choosing between the two but &lt;a href="https://www.ivanti.com/blog/itsm-and-itam-great-together-pt-1"&gt;combining as a perfect pairing&lt;/a&gt;. Both have an essential role and work more powerfully as a team.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;object codetype="CMSInlineControl" type="Video"&gt;&lt;param name="cms_type" value="video"&gt;&lt;param name="platform" value="youtube"&gt;&lt;param name="id" value="0c5zunDRNPs"&gt;&lt;/object&gt;&lt;/p&gt;

&lt;p&gt;When looking to build, expand or change your IT asset management solution or your IT service management solution, you need to be sure to explore integration capabilities for both solutions.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With the right tools in place, you can automate and improve IT processes that support IT assets. These improvements increase efficiency and control while reducing the inevitable costs and mistakes that occur from manual tasks being performed by an operator or analyst.&lt;/p&gt;
</description><pubDate>Thu, 31 Aug 2023 17:42:40 Z</pubDate></item><item><guid isPermaLink="false">50a3a2b2-3514-408b-94de-4bce208c27ad</guid><link>https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part Two: Implementation Takes Time</title><description>&lt;p&gt;In a previous blog post, I discussed the&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time"&gt;two main areas to audit&lt;/a&gt;&amp;nbsp;before the European Union’s updated Network and Information Security Directive (NIS2) becomes ratified law in October 2024. Specifically, these audits would:&lt;/p&gt;

&lt;p&gt;Identify your gaps with the NIS2 directive’s requirements now.&lt;/p&gt;

&lt;p&gt;Review your current supply chain security flaws.&lt;/p&gt;

&lt;p&gt;Now that we’ve discovered these security flaws, we must fix them —&amp;nbsp;before&amp;nbsp;time runs out in October 2024.&lt;/p&gt;

&lt;p&gt;So, in this post, I’ll walk you through how to resolve your weakest security issues before the NIS2 Directive deadline hits by addressing these three key areas:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Inform&amp;nbsp;management about your cybersecurity gaps&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Correctly implementing new organisation and technical security measures&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#three"&gt;Find time to train all of your employees&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;1. Inform management about your gaps – and get budget to remediate them&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3312-80-1" rel="noopener" target="_blank"&gt;imposes significant obligations&lt;/a&gt;&amp;nbsp;on organisations that fall under its scope, which may entail substantial costs and resources.&amp;nbsp;The Directive also introduces hefty fines and sanctions for non-compliance, up to a maximum of €10 million or 2% of an organisation's global annual revenue&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e4350-80-1" rel="noopener" target="_blank"&gt;Article 34&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;On top of this,&amp;nbsp;the new directive can extend liability&amp;nbsp;from entities to their individual representatives in certain situations. Moreover, when certain conditions are met, persons in management positions could be temporarily suspended (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3949-80-1" rel="noopener" target="_blank"&gt;Article 32-5b&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Therefore, following the NIS2 Directive is&amp;nbsp;a &lt;strong&gt;legal necessity&lt;/strong&gt;&amp;nbsp;and&amp;nbsp;a &lt;strong&gt;strategic priority&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To be in compliance, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Inform your management&amp;nbsp;&lt;/strong&gt;about its implications and benefits and convince them to allocate sufficient budget and resources for implementing compliance.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Present a clear business case&lt;/strong&gt;&amp;nbsp;that outlines the risks of non-compliance, the opportunities of compliance and the return on investment.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Demonstrate how compliance&lt;/strong&gt; will enhance&amp;nbsp;your organisation's reputation, trustworthiness, competitiveness and resilience.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Informing management and getting a budget is a challenging task, requiring a persuasive and evidence-based argument that showcases the value of cybersecurity for your organisation.&lt;/p&gt;

&lt;p&gt;The sooner you start this process, the more time you’ll have to secure buy-in and support from management.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible business case benefits for NIS2 compliance&lt;/h3&gt;

&lt;p&gt;Some possible benefits that you can highlight in your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&amp;nbsp;&lt;/strong&gt;by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Innovating&lt;/strong&gt;&amp;nbsp;by adopting new technologies, developing new products or services, creating new markets and more.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Following other cybersecurity regulations or standards&amp;nbsp;beyond NIS2&lt;/strong&gt;&amp;nbsp;– such as&amp;nbsp;&lt;a href="https://commission.europa.eu/law/law-topic/data-protection/data-protection-eu_en" rel="noopener" target="_blank"&gt;GDPR&lt;/a&gt;,&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO 27001&lt;/a&gt;,&amp;nbsp;&lt;a href="https://listings.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf" rel="noopener" target="_blank"&gt;PCI DSS&lt;/a&gt;&amp;nbsp;and others&amp;nbsp;&amp;nbsp;– since global frameworks often have a high overlap with the compliance requirements of NIS2.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential information sources for justifying your NIS2 compliance business case&lt;/h3&gt;

&lt;p&gt;Some sources you can use to support your business case are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Statistics or facts&lt;/strong&gt;&amp;nbsp;showing the prevalence, impact or cost of cyberattacks in your sector or region.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Case studies or examples&lt;/strong&gt;&amp;nbsp;illustrating how other organisations have benefited from complying with the NIS2 Directive or similar regulations. For example, the&amp;nbsp;Enisa NIS Investments 2022 report&amp;nbsp;shows that for 62% of the organisations implementing the older NIS directive, such implementations helped them detect security incidents; for 21%, implementations helped during security incident recovery.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Testimonials or feedback&lt;/strong&gt;&amp;nbsp;from customers, partners, regulators or experts who endorse or recommend complying with the NIS2 Directive or similar regulations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Benchmarks or indicators&lt;/strong&gt;&amp;nbsp;revealing your current or projected cybersecurity performance or progress in relation to the NIS2 Directive or your competitors.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.ivanti.com/en-au/resources/v/doc/ivi/2702/fa749d5d96a9"&gt;Ivanti’s 2023 Cyberstrategy Tool Kit for Internal Buy-In&lt;/a&gt;&amp;nbsp;is also a great resource that explains time-to-functionality and cost, how a solution helps defend against certain types of cyberattacks, and how to react to and overcome common objections.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;General business benefits of NIS2 Directive compliance&lt;/h3&gt;

&lt;p&gt;Some of the benefits of complying with the NIS2 Directive include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Reducing operational costs&lt;/strong&gt; by preventing or minimising cyberattack losses, such as downtime, data breaches, ransom payments, lawsuits, et cetera. &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;According to a report by IBM&lt;/a&gt;, the average cost of a data breach in 2022 was US$4.82 million for critical infrastructure organisations and the average time to identify and contain a breach was 277 days. If you are taking measures to comply with the NIS2 Directive, the average time spent identifying and containing a breach will be much shorter, and costs of the attack will be lower.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Increasing revenue&lt;/strong&gt;&amp;nbsp;by attracting or retaining customers who value security, privacy, quality and similar factors. According to&amp;nbsp;&lt;a href="https://www.fisglobal.com/-/media/fisglobal/worldpay/docs/insights/consumer-intelligence-series-protectme.pdf" rel="noopener" target="_blank"&gt;a survey by PwC&lt;/a&gt;, 87% of consumers say they will take their business elsewhere if they don't trust a company's data practices, and 71% of consumers say they would stop using a company's products or services if they found out it was sharing their data without their permission, which could happen with a data leak.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Improving efficiency&lt;/strong&gt;&amp;nbsp;by streamlining processes, enhancing performance, reducing errors and so on.&amp;nbsp;&lt;a href="https://www.accenture.com/us-en/insights/security/state-cybersecurity" rel="noopener" target="_blank"&gt;Accenture&lt;/a&gt; has found that&amp;nbsp;companies that adopt advanced security technologies can reduce the cost of cybercrime by up to 48%.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Complying with other regulations or standards&lt;/strong&gt;&amp;nbsp;that require cybersecurity, such as GDPR, ISO 27001, PCI DSS or others.&amp;nbsp;&lt;a href="https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf" rel="noopener" target="_blank"&gt;Cisco&lt;/a&gt;&amp;nbsp;points out that 97% of organisations that follow GDPR see benefits such as gaining competitive advantage, achieving operational efficiency and reducing sales delays.&amp;nbsp;Similar results are probably achievable by following NIS2.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;When it comes to budgeting,&amp;nbsp;the proposal for a directive by the European Commission&amp;nbsp;(&lt;a href="https://ec.europa.eu/info/law/better-regulation/have-your-say/initiatives/12475-Cybersecurity-review-of-EU-rules-on-the-security-of-network-and-information-systems_en" rel="noopener" target="_blank"&gt;Anex 7 - 1.4.3&lt;/a&gt;)&amp;nbsp;mentions that for&amp;nbsp;companies&amp;nbsp;falling under the scope of the NIS2 framework, it’s estimated they would need an increase of a maximum 22% of their current ICT security spending for the first years following the introduction of the NIS2 framework.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;However, the proposal also mentions that this average increase of ICT security spending would lead to&amp;nbsp;a &lt;strong&gt;proportionate benefit&amp;nbsp;&lt;/strong&gt;from such investments, notably due to a considerable reduction in cost of cybersecurity incidents.&lt;/p&gt;

&lt;h2 id="two"&gt;2. Correctly implement new organisational and technical security measures&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;After researching the gaps and obtaining a budget, it’s time to close those gaps. The NIS2 Directive requires companies to implement appropriate organisational and technical measures to manage their cybersecurity risks and ensure a high level of security across their networks and information systems.&lt;/p&gt;

&lt;p&gt;These measures include:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Adopting policies and procedures&lt;/strong&gt;&amp;nbsp;for risk management, incident response, business continuity, data protection, et cetera.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establishing roles and responsibilities&lt;/strong&gt;&amp;nbsp;for cybersecurity governance, oversight, coordination and other areas.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Providing training and awareness programs&lt;/strong&gt; for staff, management, customers, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing basic cyber hygiene&lt;/strong&gt;&amp;nbsp;such as encryption, authentication (MFA), firewalls, antivirus software, patching, zero trust access and so on.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting&lt;/strong&gt;&amp;nbsp;regular testing, monitoring, auditing and other measures.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Implementing those organisational and technical measures isn't a one-off or static task. It requires&amp;nbsp;&lt;strong&gt;establishing a continuous and dynamic process&lt;/strong&gt;&amp;nbsp;that adapts to changing threats, technologies, regulations and business needs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;So, the same advice applies for this process as for the other points we’ve already covered: the sooner you start, the more time you'll have to implement the necessary measures and ensure their effectiveness and efficiency.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;I would advise starting implementation&amp;nbsp;at least&amp;nbsp;in January 2024, so you’re ready before the summer holidays.&lt;/p&gt;

&lt;h3&gt;Next steps for NIS2 Directive implementations&lt;/h3&gt;

&lt;p&gt;Some possible steps that you can take to implement organisational and technical measures are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Developing and implementing&lt;/strong&gt; &lt;strong&gt;a risk-based management process&lt;/strong&gt;&amp;nbsp;that defines your objectives, scope, roles, responsibilities, resources, timelines and metrics for managing your cybersecurity risks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a security policy&lt;/strong&gt;&amp;nbsp;that establishes your principles, guidelines, standards and procedures for ensuring the security of your network and information systems.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conducting risk assessments&lt;/strong&gt; to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks; and prioritising your actions based on your risk appetite and tolerance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing security controls&lt;/strong&gt;&amp;nbsp;that protect your network and information systems from unauthorised access, use, disclosure, modification or destruction. These controls can be classified into three categories: preventive (e.g., encryption); detective, detective&amp;nbsp;&amp;nbsp;(e.g., monitoring), and corrective (e.g., backup).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing an incident response&lt;/strong&gt; &lt;strong&gt;plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for responding to cyberincidents effectively and efficiently.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a business continuity plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for maintaining or restoring your critical business processes during a cyber-related disruption or disaster.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing a review and improvement plan&lt;/strong&gt;&amp;nbsp;that defines your processes, roles, responsibilities, resources, tools and communication channels for regularly evaluating, reporting and enhancing your cybersecurity measures.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implementing the technical controls&lt;/strong&gt; for asset management and &lt;strong&gt;basic cyber hygiene&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The Directive’s reference to ‘basic cyberhygiene’ is a bit vague in&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;Article 21&lt;/a&gt;, so we’ll dive into this in another blog post. For now, think about basic security measures such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;MFA.&lt;/li&gt;
	&lt;li&gt;Patching your OS and applications as quickly as possible.&lt;/li&gt;
	&lt;li&gt;Securing network connections on public networks.&lt;/li&gt;
	&lt;li&gt;Encryption of all drives (especially removable ones.)&lt;/li&gt;
	&lt;li&gt;Privilege management and education of all employees.&lt;/li&gt;
	&lt;li&gt;Subscribing to channels that give you information about the latest patches and priorities, like&amp;nbsp;Ivanti’s Patch Tuesday webinars.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="three"&gt;3. Fix the weakest link: find time to train every employee&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive recognises that human factors are crucial for cybersecurity and that employees are often&amp;nbsp;the &lt;strong&gt;weakest link&lt;/strong&gt;&amp;nbsp;— as well as the first line of defense – in preventing or detecting cyberattacks.&lt;/p&gt;

&lt;p&gt;The Directive requires organisations to &lt;strong&gt;provide&amp;nbsp;adequate training and awareness programs&lt;/strong&gt;&amp;nbsp;for their employees, users of digital services and other stakeholders on cybersecurity issues.&lt;/p&gt;

&lt;p&gt;Training all your employees is not a sporadic or optional task. It requires a regular and comprehensive program that covers topics such as:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Basic cybersecurity concepts and terminology.&lt;/li&gt;
	&lt;li&gt;Common cyberthreats and attack vectors.&lt;/li&gt;
	&lt;li&gt;Best practices and tips for cyberhygiene.&lt;/li&gt;
	&lt;li&gt;Cybersecurity policies and procedures, made relevant and simplified for end users.&lt;/li&gt;
	&lt;li&gt;Every user’s role and responsibilities for organisational cybersecurity.&lt;/li&gt;
	&lt;li&gt;How to report and respond to incidents.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is important to note that this training&amp;nbsp;&lt;strong&gt;should be received by everyone&lt;/strong&gt;&amp;nbsp;within the company, not only by IT employees. Even management should undergo this training.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;A survey conducted for Ivanti&amp;nbsp;shows that a lot of employees are not even aware of mandatory cybersecurity training.&amp;nbsp;Just 27% of them feel “very prepared” to recognise and report threats like malware and phishing at work. 6% of them feel “very prepared” to recognize and report threats like malware and phishing at work.&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.enisa.europa.eu/publications/nis-investments-2022" rel="noopener" target="_blank"&gt;Enisa’s NIS Investments 2022 report&lt;/a&gt;, Enisa mentions that&amp;nbsp;40% of the surveyed OES (Operators of Essential Services) have no security awareness program for non-IT staff.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It is important to monitor who has&amp;nbsp;not&amp;nbsp;been trained yet and act on it. Training all your employees is not only beneficial for compliance but also for productivity, quality, innovation and customer satisfaction.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The best NIS2 advice we can give&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive is landmark legislation that aims to enhance the cybersecurity of critical sectors in the EU. It imposes significant obligations on organisations that fall under its scope, along with hefty fines and sanctions for non-compliance.&lt;/p&gt;

&lt;p&gt;Following the NIS2 Directive is a complex task. It demands&amp;nbsp;&lt;strong&gt;a proactive and comprehensive approach&lt;/strong&gt;&amp;nbsp;involving multiple steps,&amp;nbsp;stakeholders&amp;nbsp;and resources.&lt;/p&gt;

&lt;p&gt;The sooner you start preparing for it, the better prepared you will be when it becomes effective in October 2024.&lt;/p&gt;

&lt;p&gt;The best advice we can offer?&amp;nbsp;&lt;strong&gt;Do&amp;nbsp;not&amp;nbsp;wait till then: start&lt;/strong&gt;&amp;nbsp;preparing for the NIS2 Directive now!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Mon, 28 Aug 2023 17:43:02 Z</pubDate></item><item><guid isPermaLink="false">b7ea2db2-2ac1-4d6e-b11d-c540c6dfa52f</guid><link>https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-one-audits-take-time</link><atom:author><atom:name>Patrick Kaak</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/patrick-kaak</atom:uri></atom:author><category>Security</category><title>5 Reasons Why NIS2 Directive Preparation Should Start Now, Part One: Audits Take Time</title><description>&lt;p&gt;You probably heard about the European Union’s updated Network and Information Security Directive (NIS2). This directive will translate into active law in October 2024. You should be ready for it, as there are high fines and sanctions for non-compliance.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But you might be tempted to think that October 2024 is far away, right?&amp;nbsp;Think twice.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;After all, how can you know if you have plenty of time to prepare&amp;nbsp;if you don’t know how well you currently comply&amp;nbsp;with the projected regulations?&lt;/p&gt;

&lt;p&gt;So, between now and October 2024, you must audit your current cybersecurity status. Specifically:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;a href="#one"&gt;Identify gaps in meeting the NIS2 directive’s requirements, starting now&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="#two"&gt;Review your current supply chain security flaws&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;In the second part of this series, I’ll review&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas you’ll need to address to fix&amp;nbsp;the gaps your audits uncover&lt;/a&gt;&lt;/em&gt;&amp;nbsp;— including how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Implement new organizational and technical security measures correctly.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;

&lt;h2 id="one"&gt;1. Identify gaps in meeting the NIS2 Directive's requirements, starting now&lt;/h2&gt;

&lt;p&gt;The&amp;nbsp;&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32022L2555" rel="noopener" target="_blank"&gt;NIS2 Directive&lt;/a&gt; is the EU-wide legislation on cybersecurity that provides legal measures to boost the overall level of cybersecurity in the EU. It modernises the existing legal framework to keep up with increased digitization and an evolving cybersecurity threat landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;&lt;a href="https://www.europarl.europa.eu/thinktank/en/document/EPRS_BRI(2021)689333" rel="noopener" target="_blank"&gt;expands the scope of the cybersecurity rules&lt;/a&gt;&amp;nbsp;to new sectors and entities, improving the resilience and incident response capacities of public and private entities, competent authorities and the entire EU.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The NIS2 directive outlines increased measures for resilience against cyberattacks to minimize vulnerabilities and improve cyberdefense.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To comply with the NIS2 Directive, you must:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Assess&amp;nbsp;&lt;/strong&gt;your cybersecurity posture&amp;nbsp;and identify any gaps or weaknesses that may expose you to cyber risks.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Map&lt;/strong&gt;&amp;nbsp;your existing policies, procedures and controls to the directive's requirements and see where to improve or update them.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Evaluate&lt;/strong&gt;&amp;nbsp;your incident response capabilities and reporting mechanisms and ensure they align with the directive's standards.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A big problem with the NIS2 is that it tells you what you&amp;nbsp;should&amp;nbsp;do, but not&amp;nbsp;how&amp;nbsp;you should do it. Luckily, multiple frameworks can help you with the how, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="https://www.nist.gov/cyberframework" rel="noopener" target="_blank"&gt;NIST CSF (Cybersecurity Framework)&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;The&amp;nbsp;&lt;a href="https://www.iso.org/standard/27001" rel="noopener" target="_blank"&gt;ISO27001&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.iso.org/standard/75652.html" rel="noopener" target="_blank"&gt;ISO27002&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.cisecurity.org/controls" rel="noopener" target="_blank"&gt;CIS Controls&lt;/a&gt;&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards" rel="noopener" target="_blank"&gt;IEC 62443&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;In Belgium, the&amp;nbsp;&lt;a href="https://ccb.belgium.be/en/cyberfundamentals-framework" rel="noopener" target="_blank"&gt;CCB has created a Cyberfundamentals Framework&lt;/a&gt;&amp;nbsp;based on multiple frameworks with references to how the different parts of the frameworks relate to the GDPR and NIS2.&lt;/p&gt;

&lt;p&gt;After selecting the framework,&amp;nbsp;&lt;strong&gt;you must identify gaps&lt;/strong&gt;&amp;nbsp;in relation to the chosen framework and the directive's requirements. Identifying gaps is not a simple or quick task; it requires a thorough and systematic analysis of your organization's cybersecurity maturity and readiness.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You not only need to check your cybersecurity strategy and policies, but you also need to do a risk analysis to find the most critical assets and the cybersecurity risks they present, then consider security controls to bring down the risk score of those vital assets.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The sooner you start this process, the more time you’ll have&lt;/strong&gt;&amp;nbsp;to obtain the budget needed to address any issues and implement any necessary changes.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Possible NIS2 environment gaps&lt;/h3&gt;

&lt;p&gt;Some possible gaps that you may encounter in your environment are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a comprehensive cybersecurity strategy or policy&lt;/strong&gt;&amp;nbsp;that covers all aspects of risk management, incident response, business continuity, data protection, etc.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of a dedicated cybersecurity team or function&lt;/strong&gt;&amp;nbsp;that oversees, coordinates and monitors all cybersecurity activities and initiatives across the organization.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of adequate security controls or measures&lt;/strong&gt;&amp;nbsp;for protecting your network and information systems from unauthorized access, use, disclosure, modification or destruction.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of regular testing or auditing&lt;/strong&gt;&amp;nbsp;of your security controls or measures to ensure their effectiveness and compliance with the directive's requirements.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of proper training or awareness programs&lt;/strong&gt;&amp;nbsp;for your staff, management, other employees or other stakeholders on cybersecurity issues and best practices.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of clear communication or reporting channels&lt;/strong&gt;&amp;nbsp;for notifying relevant authorities or parties of any incidents or breaches that affect your services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Potential security solutions for your environment to comply with NIS2&lt;/h3&gt;

&lt;p&gt;To identify and fix these security gaps, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Run gap analysis frameworks or models&lt;/strong&gt;&amp;nbsp;that help you compare your current state with your desired state and identify areas for improvement.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement cybersecurity maturity models or standards&lt;/strong&gt;&amp;nbsp;that help you measure your level of cybersecurity performance and progress.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct a risk assessment&lt;/strong&gt;&amp;nbsp;to identify your assets, threats, vulnerabilities, impacts and likelihoods of cyberattacks.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Request external audits or assessments&lt;/strong&gt;&amp;nbsp;that help you validate your compliance status and identify any weaknesses or deficiencies.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="two"&gt;2. Review current supply chain security flaws with enough time to coordinate action with suppliers&lt;/h2&gt;

&lt;p&gt;The NIS2 Directive also&amp;nbsp;introduces new provisions on supply&amp;nbsp;chain security&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e40-80-1" rel="noopener" target="_blank"&gt;chapter 0, point 54, 56&lt;/a&gt;), recognizing that cyber threats can originate from third-party providers or subcontractors.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The directive&amp;nbsp;requires organizations to ensure that their suppliers follow&amp;nbsp;appropriate security standards and practices&amp;nbsp;(&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21-2d&lt;/a&gt;) and regularly monitor their performance and compliance (&lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32022L2555#d1e3337-80-1" rel="noopener" target="_blank"&gt;article 21–3&lt;/a&gt;).&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This isn't without reason.&amp;nbsp;&lt;strong&gt;Supply chain attacks are on the rise&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2022/blackberry-commissioned-research-reveals-four-in-five-software-supply-chains-exposed-to-cyberattack-in-the-last-12-months" rel="noopener" target="_blank"&gt;BlackBerry research&lt;/a&gt;&amp;nbsp;with over 1500 IT decision-makers in 2022, four-fifths of respondents said they had been notified of an attack or vulnerability in their supply chain within the year. Seventy-seven percent said they uncovered hidden participants in their software supply chain that they weren't previously aware of.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.accenture.com/_acnmedia/PDF-116/Accenture-Cybersecurity-Report-2020.pd" rel="noopener" target="_blank"&gt;Accenture research&lt;/a&gt;&amp;nbsp;also reveals&amp;nbsp;40% of security breaches are indirect, occurring through the supply chain.&lt;/p&gt;

&lt;p&gt;Therefore,&amp;nbsp;&lt;strong&gt;securing your supply chain is essential&lt;/strong&gt;&amp;nbsp;for ensuring business continuity, resilience, reputation and trust.&lt;/p&gt;

&lt;p&gt;But in Ivanti’s&amp;nbsp;&lt;a href="/en-au/resources/v/doc/ivi/2732/7b4205775465"&gt;&lt;em&gt;Press Reset: A 2023 Cybersecurity Status Report&lt;/em&gt;&lt;/a&gt;,&amp;nbsp;we found that&amp;nbsp;only 42%&amp;nbsp;of the over 1,300 executive leaders and security professionals surveyed said they're prepared to safeguard against supply chain threats, even though 46% call it a high-level threat.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Supply chain threats not only come via attacks&amp;nbsp;on solution providers like&amp;nbsp;&lt;a href="https://www.theverge.com/2022/3/22/22990637/okta-breach-single-sign-on-lapsus-hacker-group" rel="noopener" target="_blank"&gt;Okta&lt;/a&gt;,&amp;nbsp;&lt;a href="https://techcrunch.com/2021/07/05/kaseya-hack-flood-ransomware/" rel="noopener" target="_blank"&gt;Kaseya&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know" rel="noopener" target="_blank"&gt;SolarWinds&lt;/a&gt;, but also through partners either directly connected to your IT infrastructure or who can log into it.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;And don’t forget about attacks on your resource suppliers that may cripple them so they're unable to deliver certain resources you need for your own operations. You have to be prepared and&amp;nbsp;&lt;strong&gt;have backup vendors available&lt;/strong&gt;&amp;nbsp;who can supply those resources if your primary supplier is out of action due to a cyberattack or other cause.&lt;/p&gt;

&lt;p&gt;Supply chain security is a complex and challenging issue involving multiple actors, dependencies and interconnections — and cannot be achieved overnight.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;You need to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear and transparent communication channels&lt;/strong&gt;&amp;nbsp;with your suppliers and define your expectations and obligations regarding cybersecurity.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Conduct regular audits and assessments&lt;/strong&gt;&amp;nbsp;of your suppliers' security practices and verify that they meet the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Establish contingency plans and backup solutions&lt;/strong&gt;&amp;nbsp;in case of a disruption or compromise of your supply chain.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Furthermore, you must start engaging with your suppliers&amp;nbsp;&lt;strong&gt;as soon as possible&lt;/strong&gt;&amp;nbsp;and work together with them to ensure your supply chain is secure and resilient.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;Supply chain security challenges for NIS2&lt;/h3&gt;

&lt;p&gt;Some possible challenges that you may face in securing your supply chain are:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Lack of visibility or transparency&lt;/strong&gt;&amp;nbsp;into your suppliers' security practices, policies, or incidents.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of trust or cooperation&lt;/strong&gt;&amp;nbsp;among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of consistency or alignment&lt;/strong&gt;&amp;nbsp;in security standards, requirements, or expectations across your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of resources or capabilities&lt;/strong&gt;&amp;nbsp;to monitor, audit or verify your suppliers' security performance or compliance.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of contingency plans or backup solutions&lt;/strong&gt;&amp;nbsp;to mitigate or recover from any disruptions or compromises of your supply chain.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Lack of information&lt;/strong&gt;&amp;nbsp;as to what you expect from your supplier’s security practices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Supply chain security solutions for NIS2&lt;/h3&gt;

&lt;p&gt;To overcome these supply chain security challenges, you can:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Establish clear contracts or agreements&lt;/strong&gt;&amp;nbsp;with your suppliers that specify their security obligations, responsibilities and liabilities.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Develop common security criteria, guidelines or frameworks&lt;/strong&gt;&amp;nbsp;that apply to all suppliers in your supply chain and align with the directive's requirements.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Implement security controls, measures or tools&lt;/strong&gt;&amp;nbsp;that enable you to track, monitor or verify your suppliers' security activities, incidents or compliance status.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Create joint security teams, committees or forums&lt;/strong&gt;&amp;nbsp;that facilitate information sharing, collaboration and coordination among your suppliers or between you and your suppliers.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Build trust and mutual understanding&lt;/strong&gt;&amp;nbsp;with your suppliers through regular communication, feedback&amp;nbsp;and recognition.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;When your NIS2 Directive audits are complete, now what?&lt;/h2&gt;

&lt;p&gt;Now that you’ve determined where you currently stand in relation to the NIS2 Directive, it’s time to implement critical changes to ensure compliance by October 2024. I’m certain that addressing the gaps that your audits identified will require all the time you have — and then some! – before the regulations are officially implemented in your country.&lt;/p&gt;

&lt;p&gt;But how can you systematically address these gaps in a timely fashion? We discuss&amp;nbsp;&lt;em&gt;the &lt;a href="https://www.ivanti.com/en-au/blog/5-reasons-why-nis2-directive-preparation-should-start-now-part-two-implementation-takes-time"&gt;three areas of security changes you’ll need for NIS2&lt;/a&gt;&lt;/em&gt; in our next blog post, as we examine how to:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;Inform management about your cybersecurity gaps.&lt;/li&gt;
	&lt;li&gt;Correctly implement new organization and technical security measures.&lt;/li&gt;
	&lt;li&gt;Find time to train all of your employees.&lt;/li&gt;
&lt;/ol&gt;</description><pubDate>Mon, 28 Aug 2023 17:14:55 Z</pubDate></item><item><guid isPermaLink="false">adeaf6fb-8ffb-4d3d-b356-068ed1a58171</guid><link>https://www.ivanti.com/en-au/blog/get-it-right-by-focusing-on-service-strategy</link><atom:author><atom:name>Randal Locke</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/randal-locke</atom:uri></atom:author><category>Service Management</category><title>Get IT Right by Focusing on Service Strategy</title><description>&lt;p&gt;Too often, we in IT get so busy performing the day-to-day work and fighting the many fires that come at us each day that we neglect to take a moment and focus on ways we can be strategic about how we do our jobs.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;When building or expanding&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/service-management"&gt;IT Service Management&lt;/a&gt;&amp;nbsp;offerings, it’s important to understand how taking time to focus on service strategy can&amp;nbsp;greatly improve the efficiency&amp;nbsp;of service delivery.&lt;/p&gt;

&lt;p&gt;First, let’s begin by defining a few terms.&lt;/p&gt;

&lt;h2&gt;What is ITSM (IT Service Management)?&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.techtarget.com/searchitoperations/definition/ITSM" rel="noopener" target="_blank"&gt;IT Service Management&lt;/a&gt;&amp;nbsp;is a strategic approach for designing, delivering, managing and improving the way information technology (IT) is used within an organization. The goal of IT Service Management is to ensure that the right processes, people and technology are in place, so that the organization can meet its business goals.&lt;/p&gt;

&lt;h2&gt;What is IT Infrastructure Library (ITIL)?&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;IT Infrastructure Library (ITIL) refers to a group of documents created in the 1980s that provide a framework and best practices for building an IT Service Management (ITSM) solution. By following the recommended ITIL processes, organizations supporting an IT infrastructure can increase efficiency, while reducing service management costs.&lt;/p&gt;

&lt;h2&gt;What is a service strategy process?&lt;/h2&gt;

&lt;p&gt;ITIL defines five major areas to service strategy that can accelerate organizational success:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;&lt;strong&gt;Strategy management for IT services&lt;/strong&gt;: assessment and measurement of IT strategy&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Service portfolio management&lt;/strong&gt;: defining and documenting IT services.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Financial management for IT services&lt;/strong&gt;: determining IT service costs and budgeting.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Demand management&lt;/strong&gt;: forecasting future demand for IT services and budgeting resources.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Business relationship management&lt;/strong&gt;: managing the feedback and improvement of the IT services.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;To properly manage your environment, you need to first design a plan, then determine the type of services you are delivering, validate all costs and budgets, forecast demand, learn how to gather feedback and perform continuous service improvements.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How to design a service portfolio strategy&lt;/h2&gt;

&lt;h3&gt;Design the plan&lt;/h3&gt;

&lt;p&gt;Constructing a service portfolio can be one of the most challenging tasks for an IT organization. It is essential to resist the temptation of continuing outdated practices and strive for success.[EC4]&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Try surveying your end user community to understand their&amp;nbsp;challenges and ever-changing needs. You can narrow down the survey results to capabilities you have within your IT organization and put in place services to support these needs. Caution should be taken to ensure that you&amp;nbsp;follow best practice guidelines for enabling services the drive consistency and end-user process improvements.&lt;/p&gt;

&lt;h3&gt;Determine the type of service(s) you are delivering&lt;/h3&gt;

&lt;p&gt;Deciding on the type of service you’re offering today and wish to deliver in the future is a critical piece that will help you understand and minimize how many actual services you are delivering.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Consolidate where you can maximize resource usage, improve application management, and simplify the end user’s process for selecting assistance with the desired services. Too many services will complicate the end user’s interactions with the IT support organization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ensure that you evaluate your current services regularly to determine if they are necessary and consider potential services you may want to add in the future. Additionally, take the time to properly set up your nomenclature to reduce the need for future changes.&lt;/p&gt;

&lt;h3&gt;Validate all costs and budgets&lt;/h3&gt;

&lt;p&gt;Evaluating the cost of services needs to include not only personnel, software, hardware, services, but also soft costs, such as the cost and/or reduction in time for the people consuming those services.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Understanding soft costs can make a significant difference in expressing the value of services you’re delivering.&lt;/p&gt;

&lt;h3&gt;Forecast resource demand&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;The ever-changing world of IT and the consumers of the services makes resource demand forecasting very challenging. However, by understanding what services you are delivering and the historical need for them, you can extrapolate what your demand could be.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Resource consumption adaptability and tasks automation can minimize the negative impact of any forecast changes.&lt;/p&gt;

&lt;h3&gt;Perform continuous service improvement&lt;/h3&gt;

&lt;p&gt;The only way to improve your capabilities within an organization is with continual service improvement (CSI). Put relevant analysis and reporting in place to better understand the services you are delivering, the SLAs behind them and how they preform from the perspective of end user satisfaction.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Metrics such as mean time to repair (MTTR), cost per ticket, reopen rate of incidents, call avoidance via self-service, and AI bots and volume by department or location are critically important to help establish improvement initiatives.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;With accurate metrics, isolate and focus on areas that require improvement.&amp;nbsp;&amp;nbsp;Lastly, assign a cost to each improvement initiative and prioritize strategically based on cost versus value.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;It’s been often stated that “if you fail to plan, you plan to fail.”&amp;nbsp;&amp;nbsp;Although some ITIL recommendations might not be practical for&amp;nbsp;every&amp;nbsp;organization, they are a great place to start when building an IT Service Management solution.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;The ITIL service strategy processes focus on planning for an outcome and evaluating your performance against customer expectations. ITIL encourages periodic evaluation and amendments of processes to respond to the ever-changing environment, with the aim of being more effective in delivering service value to your organization.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
</description><pubDate>Thu, 24 Aug 2023 16:06:25 Z</pubDate></item><item><guid isPermaLink="false">c631b2a0-c9e7-4250-b987-eb3b355e1a6b</guid><link>https://www.ivanti.com/en-au/blog/august-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Patch Tuesday</category><title>August 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/OESD6bAXqvE" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;h2&gt;2023 Year to Date: How Vulnerable Are We?&lt;/h2&gt;

&lt;p&gt;We are past the mid-way point of 2023. The average ransomware payment is up, but the percentage of victims paying the ransom are down. The shift toward a risk-based approach to vulnerability management is moving along, but slowly. Threat actors are fast to move on zero-day and recently resolved vulnerabilities, but just as likely to target vulnerabilities that have been exposed for years.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday graphic." src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/08/microsoftteams-image-12.png"&gt;&lt;/p&gt;

&lt;h2&gt;The shift to data exfiltration only ransoms&lt;/h2&gt;

&lt;p&gt;The Ransomware market is constantly shifting and rapidly innovating and trying new things. The latest shift in tactics to skip the encryption and focus on Data Exfiltration only has made a huge impact on the average ransoms being paid this year, but the drop in victims willing to pay is driving the overall percentage of ransoms paid to an all time low.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.coveware.com/blog/2023/7/21/ransom-monetization-rates-fall-to-record-low-despite-jump-in-average-ransom-payments" rel="noopener" target="_blank"&gt;Coveware’s July 2023 Quarterly Report&lt;/a&gt;&amp;nbsp;is tracking the Average Ransom Payment at $740k (+126% from Q1 2023) and attributes this spike to the massive MOVEit campaign executed by CloP impacting over 1000 companies. While the average ransom paid has spiked due to this massive DXF-Only campaign, it has also driven the overall percentage of victims willing to pay to an all time low of 34%.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;The shift to risk-based vulnerability management continues&lt;/h2&gt;

&lt;p&gt;In&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/blog/may-2023-patch-tuesday"&gt;Ivanti’s May Patch Tuesday Blog&lt;/a&gt;,&amp;nbsp;I mentioned the CISA KEV (Known Exploited Vulnerabilities) list had reached 925 CVEs and predicted they would reach 1k CVEs by late August. CISA KEV has reached 982 prior to August Patch Tuesday and appears to be slowing down their additions to the list vs previous years. While my prediction is close, I may have been off by a month or so. We shall see as the month of August progresses.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;For those who read&amp;nbsp;&lt;a href="https://www.helpnetsecurity.com/2023/08/04/august-2023-patch-tuesday-forecast/" rel="noopener" target="_blank"&gt;Todd Schell’s Patch Tuesday Forecast&lt;/a&gt;&amp;nbsp;on Help-Net Security last week or caught some of the recent news regarding the CVSS 4.0 public preview.&amp;nbsp;&lt;a href="https://www.first.org/cvss/v4-0/" rel="noopener" target="_blank"&gt;CVSS 4.0&lt;/a&gt;&amp;nbsp;is the next step towards providing a better risk-based approach to assessing vulnerabilities and prioritizing remediation. The question is, will it be enough of a step forward?&lt;/p&gt;

&lt;p&gt;A lot of news focuses on Zero-day vulnerabilities, but CISA KEV is still adding more older CVEs than new ones. Coming into August Patch Tuesday 2023 there have been 114 CVEs added to CISA KEV so far this year. 55 (48.2%) were CVEs first identified in 2023. The additional 59 CVEs (51.8%) were CVEs from 2022 or earlier dating as far back as 2004 (CVE-2004-1464). 76 of the CVEs added in 2023 were CVEs reported in 2022 or 2023 (66%), but one third of the additions were older than 2022. This is a pretty large gap in remediation of exploited vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Risk-based vulnerability management vs ransomware&lt;/h2&gt;

&lt;p&gt;A risk-based vulnerability management solution can provide the visibility to shift vulnerability remediation to focus on the vulnerabilities actively being used by threat actors, especially ransomware threat actors. Comparing Ivanti Risk-Based Vulnerability Management data vs CISA KEV you can see that progress is being made, but there is still a gap.&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;CISA KEV is tracking 982 CVEs currently vs Ivanti RBVM is tracking almost 39k weaponized vulnerabilities.&lt;/li&gt;
	&lt;li&gt;Ivanti RBVM tracks vulnerabilities tied to Ransomware campaigns and is currently tracking 367 vulnerabilities. CISA KEV contains 132 (~40%) of those CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;26 of the 367 CVEs tied to Ransomware campaigns were from 2022 or 2023. The majority (341 or ~93%) were older than 2022.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;In the past 30 days there have been 104 CVEs that are trending amongst threat actors (Ransomware, Malware and other sources of exploitation). 18 of the 104 CVEs are from 2023. CISA currently is tracking only 40 of the 104 CVEs.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This is not a product pitch (although it is a good one) but calling out that we are still falling behind in the vulnerability remediation race. CVSS 4.0 is a step in the right direction, but not nearly good enough to keep up with the challenges we face. CISA KEV is a good start but has many gaps in visibility especially for the vulnerabilities that are trending and that are tied to ransomware campaigns.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;August 2023 patch tuesday&lt;/h2&gt;

&lt;p&gt;Microsoft has released updates resolving 74 new CVEs this month, one of which is confirmed exploited and six are rated by Microsoft as Critical. Microsoft also updated&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884" rel="noopener" target="_blank"&gt;CVE-2023-36884&lt;/a&gt;&amp;nbsp;released in July to split the Office products out into a separate Defense in Depth Advisory (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230003" rel="noopener" target="_blank"&gt;ADV230003&lt;/a&gt;). Besides the OS and Office updates, Microsoft has updates for Exchange Server, .NET, Azure, SQL Server, and Teams making for a significant lineup this August.&lt;/p&gt;

&lt;p&gt;Additional updates from Google Chrome released on August 3rd&amp;nbsp;and Microsoft Edge (Chromium) updated on August 7th&amp;nbsp;and a lineup of updates from Adobe should also be included in your update activities this month.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Ivanti EPMM vulnerability remediation update&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Ivanti continues to collaborate with threat researchers after the joint release of Cybersecurity Advisories on&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/24/ivanti-releases-security-updates-endpoint-manager-mobile-epmm-cve-2023-35078" rel="noopener" target="_blank"&gt;CVE-2023-35078&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://www.cisa.gov/news-events/alerts/2023/07/28/ivanti-releases-security-updates-epmm-address-cve-2023-35081" rel="noopener" target="_blank"&gt;CVE-2023-35081&lt;/a&gt;&amp;nbsp;on August 1, 2023, and urged organizations to apply the patches released by the organization. Ivanti is continuing to work actively with customers to upgrade their appliances and helping them apply the fix.&lt;/p&gt;

&lt;p&gt;An additional advisory (CVE-2023-35082 - Remote Unauthenticated API Access Vulnerability) was released on August 2nd&amp;nbsp;and updated on August 7th. An update and additional script is required to remediate the vulnerability.&amp;nbsp;&lt;a href="https://forums.ivanti.com/s/article/KB-Remote-Unauthenticated-API-Access-Vulnerability-CVE-2023-35082?language=en_US" target="_blank"&gt;Guidance on how to remediate&lt;/a&gt;&amp;nbsp;can be found on the Ivanti Community. The update to resolve the previous two CVEs with the additional RPM script will remediate all three vulnerabilities.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;While not confirmed to be used in active exploits in the wild, CVE-2023-35082 has been publicly disclosed by the researchers who discovered it. Ivanti is recommending customers update to the latest version and apply the script as soon as possible to respond to confirmed exploits of CVE-2023-35078 and CVE-2023-35081 and to stay ahead of any attempt to utilize CVE-2023-35082.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Microsoft updates&lt;/h2&gt;

&lt;p&gt;Microsoft updated the affected products listed in&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884" rel="noopener" target="_blank"&gt;CVE-2023-36884&lt;/a&gt;&amp;nbsp;removing the Office products originally listed in the CVE. The Office products listed in&amp;nbsp;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230003" rel="noopener" target="_blank"&gt;ADV230003&lt;/a&gt;&amp;nbsp;are not directly vulnerable, but can be used in an attack chain to exploited CVE-2023-36884. Microsoft has clarified the changes in the Office updates were a Defense in Depth measure. Microsoft recommends applying the Office updates discussed in the advisory in addition to the August Windows OS updates.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Microsoft has resolved a Denial of Service vulnerability in .NET and Visual Studio (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38180" rel="noopener" target="_blank"&gt;CVE-2023-38180&lt;/a&gt;). According to the CVE details code maturity has reached proof-of-concept and it is confirmed to be exploited in the wild. The CVE is only rated as Important and the CVSS v3.1 score is 7.5, but taking a risk-based approach this should be treated as a higher priority this month.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Third Party Updates for August 2023 Patch Tuesday&amp;nbsp;&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;Google Chrome released Chrome 115.0.5790.171 on August 3 resolving 11 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Microsoft Edge (Chromium 115.0.5790.171) released on August 7 resolving 11 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released Acrobat and Reader (&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb23-30.html" rel="noopener" target="_blank"&gt;APSB23-30&lt;/a&gt;) resolving 30 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released Commerce (&lt;a href="https://helpx.adobe.com/security/products/magento/apsb23-42.html" rel="noopener" target="_blank"&gt;APSB23-42&lt;/a&gt;) resolving 3 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released Dimension (&lt;a href="https://helpx.adobe.com/security/products/dimension/apsb23-44.html" rel="noopener" target="_blank"&gt;APSB23-44&lt;/a&gt;) resolving 3 CVEs.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Adobe released XMP Toolkit SDK (&lt;a href="https://helpx.adobe.com/security/products/xmpcore/apsb23-45.html" rel="noopener" target="_blank"&gt;APSB23-45&lt;/a&gt;) resolving 1 CVE.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 08 Aug 2023 22:58:39 Z</pubDate></item><item><guid isPermaLink="false">ef68e054-c2be-48b9-9675-032ffcf2d8fd</guid><link>https://www.ivanti.com/en-au/blog/making-sense-of-wwdc23-what-it-admins-need-to-know-to-manage-apple-devices</link><atom:author><atom:name>Yosune Baltra</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/yosune-baltra</atom:uri></atom:author><title>WWDC23: What IT Admins Need to Know to Manage Apple Devices</title><description>&lt;p&gt;Apple’s annual developer conference, &lt;a href="https://developer.apple.com/wwdc23/" rel="noopener" target="_blank"&gt;WWDC&lt;/a&gt;, is a firehose of information for anyone who manages Apple devices.&lt;/p&gt;

&lt;p&gt;New operating systems (notably iOS 17, iPadOS 17,&amp;nbsp;macOS 14 and watchOS 10) and new products (15-inch MacBook Air and Apple&amp;nbsp;Vision Pro) might have dominated the headlines, but WWDC23 also brought a host of&amp;nbsp;no less consequential new capabilities for enterprise device management.&lt;/p&gt;

&lt;p&gt;So what should IT admins pay attention to in the lead up to this fall’s OS updates?&lt;/p&gt;

&lt;h2&gt;A big step forward in declarative device management&lt;/h2&gt;

&lt;p&gt;Apple introduced &lt;strong&gt;declarative management&lt;/strong&gt; in 2021 as an extended functionality to the MDM protocol, and this year they continued the trend of releasing configurations that can coexist on MDM and declarative management at the same time as part of a gradual transition. Apple has announced a &lt;a href="https://developer.apple.com/videos/play/wwdc2023/10041/" rel="noopener" target="_blank"&gt;transition path&lt;/a&gt; from today’s MDM protocol to declarative management, which will make the changeover seamless for end users.&lt;/p&gt;

&lt;p&gt;What’s new this year is that Apple is also releasing features that can &lt;em&gt;only&lt;/em&gt; be supported via declarative management – &lt;strong&gt;passkeys&lt;/strong&gt;&amp;nbsp;and &lt;strong&gt;Apple Watch management&lt;/strong&gt;. Ivanti’s UEM products will support declarative device management, and therefore these new features, in the next few quarters.&lt;/p&gt;

&lt;h2&gt;Simpler device enrollment – for IT &lt;em&gt;and&lt;/em&gt; for end users&lt;/h2&gt;

&lt;p&gt;Getting rid of manual processes is a clear theme for the device enrollment enhancements released this year.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Return to service&lt;/strong&gt;, a new capability for bringing devices back into management, lets IT admins send a command to erase and then re-enroll a device automatically – a process that until now was manual. This feature is particularly useful for devices without dedicated users that need to be remotely reconfigured without manual intervention, for example an iPad that needs to be reset after a patient is discharged from a hospital.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Account-driven device enrollment&lt;/strong&gt; (an enhancement to account-driven user enrollment, which is already available) enrolls devices automatically when users sign in with their work or school account, rather than requiring the user to install a profile manually. Eliminating this extra step can streamline device onboarding.&lt;/p&gt;

&lt;p&gt;On the topic of device enrollment, &lt;strong&gt;Setup Assistant&lt;/strong&gt; also saw enhancements worth paying attention to: the ability to restrict enrollment to devices that meet &lt;strong&gt;minimum OS requirements&lt;/strong&gt;, and the ability to &lt;strong&gt;configure FileVault&lt;/strong&gt; during setup. These features let companies ship devices directly from the supplier to the end user without needing a manual setup to ensure basic security features are in compliance.&lt;/p&gt;

&lt;h2&gt;Easy end user authentication for a better end user experience&lt;/h2&gt;

&lt;p&gt;Updates to &lt;strong&gt;Managed Apple IDs&lt;/strong&gt; give organizations access to a range of improved authentication features that make it easier for end users to access their devices and services. Managed Apple IDs now include support for iCloud Keychain, Apple Wallet, and access management controls that enable organizations to restrict access to specific services and dictate the management state of a device when a user signs in. Additionally, passkeys can now be synced across managed devices for an even more secure authentication experience.&lt;/p&gt;

&lt;p&gt;Platform single sign-on (SSO) now lets you &lt;strong&gt;create local user accounts on a shared Mac&lt;/strong&gt; using credentials from the Identity Provider (IdP).&lt;/p&gt;

&lt;p&gt;Finally, &lt;strong&gt;Managed Device Attestation&lt;/strong&gt; is now available on macOS and offers strong assurances about the security posture and properties of a device.&lt;/p&gt;

&lt;h2&gt;Useful updates to device and application connectivity&lt;/h2&gt;

&lt;p&gt;For an alternative to VPN, you can now use a new &lt;strong&gt;built-in relay&lt;/strong&gt; to secure traffic using an HTTP/3 or HTTP/2 tunnel. The configuration is domain-based and can be applied to managed apps, domains, or the entire device.&lt;/p&gt;

&lt;p&gt;Apple has also expanded &lt;strong&gt;802.1X support for Ethernet&lt;/strong&gt;, which previously was only supported for macOS, allowing you to connect an iPhone, iPad&amp;nbsp;or Apple TV&amp;nbsp;to a restricted network&amp;nbsp;that requires authentication without needing to rely on WiFi.&lt;/p&gt;

&lt;h2&gt;Finally – private network and network slicing support&lt;/h2&gt;

&lt;p&gt;Long-awaited support for &lt;strong&gt;private 5G and LTE networks&lt;/strong&gt; is finally here for iOS 17 and iPadOS 17.&lt;/p&gt;

&lt;p&gt;Administrators can activate private SIMs automatically when a device enters a geofence in order to &lt;strong&gt;prioritize cellular over Wi-Fi&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;And with &lt;strong&gt;5G network slicing&lt;/strong&gt;, mobile network operators can customize traffic through a 5G standalone network with specific quality-of-service requirements for network latency, throughput and packet loss.&lt;/p&gt;

&lt;h2&gt;Discovering new use cases for wearables in the workplace?&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Apple Watch&lt;/strong&gt;&amp;nbsp;is newly supported as a managed device. An Apple Watch that is paired to a Supervised iPhone can now be enrolled and managed with watchOS 10 – with the very important requirement&amp;nbsp;that declarative management configuration must be enabled.&lt;/p&gt;

&lt;h2&gt;Planning ahead for this fall’s OS updates&lt;/h2&gt;

&lt;p&gt;Ivanti is actively testing the betas of iOS 17 and macOS 14 to make sure you can take advantage of these new features for a better end-user experience and streamlined IT processes.&lt;/p&gt;

&lt;p&gt;Look out for communication on compatibility as we plan for &lt;strong&gt;day zero support&lt;/strong&gt; for Ivanti products.&lt;/p&gt;
</description><pubDate>Tue, 25 Jul 2023 19:51:36 Z</pubDate></item><item><guid isPermaLink="false">4c628da9-8b78-4b7a-b305-ba4827288147</guid><link>https://www.ivanti.com/en-au/blog/july-2023-patch-tuesday</link><atom:author><atom:name>Chris Goettl</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/chris-goettl</atom:uri></atom:author><category>Security</category><category>Patch Tuesday</category><title>July 2023 Patch Tuesday</title><description>&lt;div&gt;&lt;iframe allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen="" frameborder="0" src="https://www.youtube.com/embed/rgltOAO2Sn4" title="YouTube video player"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;p&gt;&lt;img alt="Patch Tuesday updates for July 2023 showing 10 bulletins, 7 critical, and 3 important Microsoft vulnerabilities and 2 Mozilla bulletins" src="https://static.ivanti.com/sites/marketing/media/images/blog/2023/07/patchtues-page-blog_july2023.jpg"&gt;&lt;/p&gt;

&lt;p&gt;This month is going to be a painful one, with:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#Microsoft"&gt;Multiple zero-day exploits being resolved by Microsoft&lt;/a&gt;,&lt;/li&gt;
	&lt;li&gt;&lt;a href="#Kerberos-Netlogon"&gt;Some operational changes for Kerberos and Netlogon vulnerability resolutions&lt;/a&gt;, and&lt;/li&gt;
	&lt;li&gt;&lt;a href="#Post-Tuesday-Updates"&gt;A large lineup of third-party updates releasing on and after July’s Patch Tuesday&lt;/a&gt; – including Oracle's quarterly CPU and Java updates.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="Kerberos-Netlogon"&gt;&lt;strong&gt;Kerberos and Netlogon Vulnerability Changes&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;July is going to be a big month from an operational perspective.&lt;/p&gt;

&lt;p&gt;A number of changes are going into effect regarding two previously resolved CVEs:&lt;/p&gt;

&lt;ol&gt;
	&lt;li&gt;An Elevation of Privilege vulnerability resolution in Kerberos (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" rel="noopener" target="_blank"&gt;CVE-2022-37967&lt;/a&gt;), and&lt;/li&gt;
	&lt;li&gt;An Elevation of Privilege vulnerability in Netlogon RPC (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" rel="noopener" target="_blank"&gt;CVE-2022-38023&lt;/a&gt;).&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Both CVEs were resolved in 2022, but the code change alone did not resolve the vulnerabilities.&lt;/p&gt;

&lt;h3&gt;What to expect in July 2023’s updates for Kerberos and Netlogon vulnerabilities&lt;/h3&gt;

&lt;p&gt;Microsoft outlined a phased rollout of enforcement for both vulnerabilities, due to the fact that they are changing some core behaviors in two commonly used authentication mechanisms.&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://support.microsoft.com/en-us/topic/kb5020805-how-to-manage-kerberos-protocol-changes-related-to-cve-2022-37967-997e9acc-67c5-48e1-8d0d-190269bf4efb" rel="noopener" target="_blank"&gt;KB5020805&lt;/a&gt; outlines the timing of changes for the Kerberos vulnerability&lt;/strong&gt; (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967" rel="noopener" target="_blank"&gt;CVE-2022-37967&lt;/a&gt;). For July, Microsoft is stepping up to initial enforcement. The earlier changes have been to add the capabilities to address the security bypass and audit logging to show if organizations had systems that needed attention to prepare for the change.

	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;This July 2023&amp;nbsp;OS update will default the behavior to Enforcement mode&lt;/strong&gt;, but still allow an Administrator to override and set Audit mode explicitly.&lt;/li&gt;
		&lt;li&gt;&lt;strong&gt;The future October 10, 2023&lt;/strong&gt;, update will remove the Admin override and default to full enforcement.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;&lt;a href="https://support.microsoft.com/en-us/topic/kb5021130-how-to-manage-the-netlogon-protocol-changes-related-to-cve-2022-38023-46ea3067-3989-4d40-963c-680fd9e8ee25" rel="noopener" target="_blank"&gt;KB5021130&lt;/a&gt; outlines the timing of changes for the Netlogon vulnerability&lt;/strong&gt; (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023" rel="noopener" target="_blank"&gt;CVE-2022-38023&lt;/a&gt;). For July, Microsoft is stepping up to full enforcement. The earlier changes have been to add the capabilities to address the security bypass and audit logging to show if organizations had systems that needed attention to prepare for the change.
	&lt;ul&gt;
		&lt;li&gt;&lt;strong&gt;This July 2023&amp;nbsp;update will remove the ability &lt;/strong&gt;to override enforcement and allow compatibility mode for RPC Sealing.&lt;/li&gt;
		&lt;li&gt;&lt;strong&gt;After deploying the July update&lt;/strong&gt;, Netlogon will fully enforce RPC Sealing.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id="Microsoft"&gt;&lt;strong&gt;Multiple Zero Days and Public Disclosures from Microsoft for July 2023&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Microsoft has resolved 130 net new vulnerabilities this month, and there are updates to 9 previously released CVEs. Six CVEs and one Advisory have confirmed exploits.&lt;/p&gt;

&lt;p&gt;One of the six exploited vulnerabilities &lt;a href="https://www.ivanti.com/en-au/blog/may-2023-patch-tuesday" target="_blank"&gt;released originally in May&lt;/a&gt;, and has been updated this month to address all versions of Microsoft Windows.&lt;/p&gt;

&lt;p&gt;This month, I'd specifically like to highlight:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;a href="#CVE-24932"&gt;&lt;strong&gt;CVE-2023-24932&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - Secure Boot): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36871"&gt;&lt;strong&gt;CVE-2023-36871 &lt;/strong&gt;&lt;/a&gt;(Security Feature Bypass - AD): Functional Code Maturity&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-35311"&gt;&lt;strong&gt;CVE-2023-35311&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - Outlook): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36884"&gt;&lt;strong&gt;CVE-2023-36884&lt;/strong&gt;&lt;/a&gt; (Remote Code Execution - Office and Windows HTML): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-36874"&gt;&lt;strong&gt;CVE-2023-36874&lt;/strong&gt;&lt;/a&gt; (Privilege Escalation - Windows Error Reporting): Reported Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-32049"&gt;&lt;strong&gt;CVE-2023-32049&lt;/strong&gt;&lt;/a&gt; (Security Feature Bypass - SmartScreen): Critical Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#CVE-32046"&gt;&lt;strong&gt;CVE-2023-32046&lt;/strong&gt;&lt;/a&gt; (Privilege Escalation - MSHTML): Important Confirmed Exploits&lt;/li&gt;
	&lt;li&gt;&lt;a href="#ADV23001"&gt;&lt;strong&gt;Microsoft Advisory ADV23001&lt;/strong&gt;&lt;/a&gt; - Malicious Signed Drivers&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id="CVE-24932"&gt;&lt;strong&gt;Microsoft CVE-2023-24932&lt;/strong&gt; (Security Feature Bypass - Secure Boot): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has updated &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932" rel="noopener" target="_blank"&gt;CVE-2023-24932&lt;/a&gt;, which is a Security Feature Bypass in Secure Boot.&lt;/p&gt;

&lt;p&gt;The CVE was originally resolved in May 2023, but Microsoft has expanded the affected OS versions, and is recommending customers update to the July update on all affected Windows OS version this month. The vulnerability has confirmed exploits in the wild.&lt;/p&gt;

&lt;p&gt;The CVSS v3.1 base score is 6.7 and it is rated as Important by Microsoft. However,&amp;nbsp;with confirmed exploits and publicly disclosed functional code, this vulnerability should be treated as Critical.&lt;/p&gt;

&lt;h3 id="CVE-36871"&gt;&lt;strong&gt;Microsoft CVE-2023-36871 &lt;/strong&gt;(Security Feature Bypass - AD): Functional Code Maturity&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Azure Active Directory (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36871" rel="noopener" target="_blank"&gt;CVE-2023-36871&lt;/a&gt;). The CVE is rated as Important and has a CVSS v3.1 base score of 6.5, but the temporal metrics list code maturity as functional.&lt;/p&gt;

&lt;p&gt;An attacker would require a low privileged session on the user’s device to obtain a JSON web token. The token could thenbe used to create a long-lived assertion using the Windows Hello for Business Key from the victim’s device.&lt;/p&gt;

&lt;p&gt;In this case, the fix is to:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Update to the July update&lt;/strong&gt; on all AD FS servers.&lt;/li&gt;
	&lt;li&gt;Then, &lt;strong&gt;enable the setting&lt;/strong&gt; required to turn on the EnforceNonceInJWT setting.
	&lt;ul&gt;
		&lt;li&gt;The PowerShell command to enable this setting is provided in the CVE article.&lt;/li&gt;
	&lt;/ul&gt;
	&lt;/li&gt;
&lt;/ul&gt;

&lt;h3 id="CVE-35311"&gt;&lt;strong&gt;Microsoft CVE-2023-35311&lt;/strong&gt;&amp;nbsp;(Security Feature Bypass - Outlook): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass in Microsoft Outlook (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35311" rel="noopener" target="_blank"&gt;CVE-2023-35311&lt;/a&gt;). This vulnerability has confirmed exploitation.&lt;/p&gt;

&lt;p&gt;The attacker could send a user a specially crafted URL to bypass the Microsoft Outlook Security Notice prompt. The Preview Pane is an attack vector for this vulnerability, but user interaction is required.&lt;/p&gt;

&lt;p&gt;Given the fact that &lt;a href="https://www.ivanti.com/en-au/webinars/2023/phishing-2-0-how-to-stop-cyberattacks-even-pros-can-t-catch" target="_blank"&gt;phishing a user is a statistical challenge&lt;/a&gt;, the priority for getting this fix rolled out is Critical, even though Microsoft’s severity rating is only Important.&lt;/p&gt;

&lt;h3 id="CVE-36884"&gt;&lt;strong&gt;Microsoft CVE-2023-36884&lt;/strong&gt; (Remote Code Execution - Office and Windows HTML): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Remote Code Execution vulnerability in Office and Windows HTML (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884" rel="noopener" target="_blank"&gt;CVE-2023-36884&lt;/a&gt;). The CVE is rated as Important, but has confirmed reports of exploitation in the wild and functional code has been publicly disclosed for this vulnerability.&lt;/p&gt;

&lt;p&gt;An attacker could create a specially crafted Microsoft Office document that enables them to perform remote code execution in the context of the victim.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft has not yet released an update to fix this issue,&lt;/strong&gt; but has provided a configuration level mitigation to block Office applications from creating child processes. Running as least privileged could also help to mitigate the attack and require the attacker to execute additional exploits to elevate their privilege level.&lt;/p&gt;

&lt;p&gt;Microsoft has released a &lt;a href="https://aka.ms/Storm-0978" rel="noopener" target="_blank"&gt;blog entry&lt;/a&gt; describing steps that can be taken to protect systems until a fix becomes available.&lt;/p&gt;

&lt;h3 id="CVE-36874"&gt;&lt;strong&gt;Microsoft CVE-2023-36874&lt;/strong&gt;&amp;nbsp;(Privilege Escalation - Windows Error Reporting): Reported Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows Error Reporting (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36874" rel="noopener" target="_blank"&gt;CVE-2023-36874&lt;/a&gt;). The CVE is rated as important but has reported cases of exploitation. An attacker – with local access to the target machine with permission to create folders and performance traces on the machine&amp;nbsp;– could gain administrator privileges.&lt;/p&gt;

&lt;h3 id="CVE-32049"&gt;&lt;strong&gt;Microsoft CVE-2023-32049&lt;/strong&gt; (Security Feature Bypass - SmartScreen): Critical Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved a Security Feature Bypass vulnerability in Windows SmartScreen (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32049" rel="noopener" target="_blank"&gt;CVE-2023-32049&lt;/a&gt;). The CVE is rated as Important, but Microsoft has confirmed reports of exploitation for this vulnerability increasing the urgency to Critical.&lt;/p&gt;

&lt;p&gt;The attacker can send a user a specially crafted URL that could allow the "Open File – Security Warning" prompt to be bypassed, opening additional opportunities to further compromise the target system.&lt;/p&gt;

&lt;h3 id="CVE-32046"&gt;&lt;strong&gt;Microsoft CVE-2023-32046&lt;/strong&gt; (Privilege Escalation - MSHTML): Important Confirmed Exploits&lt;/h3&gt;

&lt;p&gt;Microsoft has resolved an Elevation of Privilege vulnerability in Windows MSHTML (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32046" rel="noopener" target="_blank"&gt;CVE-2023-32046&lt;/a&gt;). Microsoft has rated the CVE as Important and has reports of exploitation in the wild.&lt;/p&gt;

&lt;p&gt;An attacker could target a user in a variety of ways, including email- and web-based attack scenarios. If exploited, the attacker would gain the rights of the user that is running the affected application. So,&amp;nbsp;running least privilege would help to mitigate the impact of this vulnerability, forcing&amp;nbsp;the attacker to take additional steps to take full control of the target system.&lt;/p&gt;

&lt;p&gt;While IE 11 has been retired, you will see a reference to IE Cumulative updates listed for Windows Server 2008, 2008 R2, 2012&amp;nbsp;and 2012 R2 due to the MSHTML, EdgeHTML&amp;nbsp;and scripting platforms still being supported.&lt;/p&gt;

&lt;p&gt;If you are installing the Security Only updates on these platforms, Microsoft is recommending running the IE Cumulative update as well to fully resolve the CVE.&lt;/p&gt;

&lt;h3 id="ADV23001"&gt;&lt;strong&gt;Microsoft Advisory ADV23001&lt;/strong&gt; - Malicious Signed Drivers&lt;/h3&gt;

&lt;p&gt;Microsoft has released an Advisory (&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230001" rel="noopener" target="_blank"&gt;ADV23001&lt;/a&gt;) providing guidance on Microsoft Signed Drivers being used maliciously.&lt;/p&gt;

&lt;p&gt;Several developer accounts for the Microsoft Partner Center (MPC) were engaged in submitting malicious drivers to obtain a Microsoft signature.&lt;/p&gt;

&lt;p&gt;Microsoft has released Window Security updates (see their &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/ADV230001" rel="noopener" target="_blank"&gt;"Security Updates" table&lt;/a&gt;) that untrust drivers and driver signing certificates for the impacted files, and has suspended the partners' seller accounts.&amp;nbsp;All the developer accounts involved in this incident were immediately suspended.&lt;/p&gt;

&lt;p&gt;Additionally, Microsoft has implemented blocking detections (Microsoft Defender 1.391.3822.0 and newer) to help protect customers from legitimately signed drivers that have been used maliciously in post-exploit activity.&lt;/p&gt;

&lt;p&gt;For more information about how the Windows Code Integrity feature protects Microsoft customers from revoked certificates, see Microsoft Support's "&lt;a href="https://support.microsoft.com/en-us/topic/kb5029033-notice-of-additions-to-the-windows-driver-stl-revocation-list-d330efa5-3fb7-4903-9f0b-3230d31fca38" rel="noopener" target="_blank"&gt;Notice of additions to the Windows Driver.STL revocation list&lt;/a&gt;".&amp;nbsp;&lt;/p&gt;

&lt;h2 id="Post-Tuesday-Updates"&gt;Third-Party Updates for July 2023&amp;nbsp;– Including Java Updates from Oracle&lt;/h2&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Mozilla &lt;/strong&gt;has released updates for Firefox and Firefox ESR.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Adobe &lt;/strong&gt;Acrobat and Reader has an update that appears to be non-security related, but has released updates for Adobe InDesign and ColdFusion.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Google Chrome&lt;/strong&gt; is likely to update on July 11&lt;sup&gt;th&lt;/sup&gt; or shortly after.&lt;/li&gt;
	&lt;li&gt;&lt;a href="https://www.oracle.com/security-alerts/" rel="noopener" target="_blank"&gt;&lt;strong&gt;Oracle&lt;/strong&gt;’s quarterly CPU (Critical Patch Update)&lt;/a&gt; is due to release on July 18&lt;span&gt;,&amp;nbsp;&lt;/span&gt;with updates for the lineup of Oracle products&amp;nbsp;– including Java.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As you begin your maintenance this cycle, keep in mind that – after the Oracle Java release – there is a stream of additional updates that will occur, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;RedHat OpenJDK,&lt;/li&gt;
	&lt;li&gt;Amazon Corretto,&lt;/li&gt;
	&lt;li&gt;Azul Zulu,&lt;/li&gt;
	&lt;li&gt;Eclipse Adoptium,&lt;/li&gt;
	&lt;li&gt;Adopt OpenJDK, and&lt;/li&gt;
	&lt;li&gt;Other Java frameworks.&lt;/li&gt;
&lt;/ul&gt;
</description><pubDate>Tue, 11 Jul 2023 22:31:12 Z</pubDate></item><item><guid isPermaLink="false">2a3cf19a-1d5e-496f-af51-388c4e79b384</guid><link>https://www.ivanti.com/en-au/blog/how-consolidating-your-tech-stack-drives-dex-outcomes</link><atom:author><atom:name>Mareike Fondufe</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/mareike-fondufe</atom:uri></atom:author><title>How Consolidating Your Tech Stack Drives DEX Outcomes</title><description>&lt;p&gt;Every month, it seems that a new “must use” tool hits the market.&amp;nbsp;What ends up happening is IT teams are gifted a&amp;nbsp;hodge-podge&amp;nbsp;of tools&amp;nbsp;—&amp;nbsp;snowballing into unnecessary frustration and increased workloads.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“The issue is there are so many&amp;nbsp;technologies and ways you can&amp;nbsp;have this experience, and it is very&amp;nbsp;easy to fall into a trap of&amp;nbsp;having too&amp;nbsp;many tools&amp;nbsp;and that will dilute your&amp;nbsp;experience and lead to frustration.&amp;nbsp;We have information on multiple&amp;nbsp;SharePoint sites, Teams, Yammer,&amp;nbsp;Service Now, One Drive&amp;nbsp;and who&amp;nbsp;knows what else exists, so we have&amp;nbsp;a very bad experience as you do&amp;nbsp;not know where to find things, and&amp;nbsp;if you do not follow any of those&amp;nbsp;channels, you will miss stuff. Pick&amp;nbsp;your standard and do not fall into&amp;nbsp;the trap of implementing the flavor&amp;nbsp;of the month.”​&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;- Team Lead, Emerson Electric Co​&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Growing digital environments with too many disparate tools has created a scenario where optimising&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ebooks/ema-iva009a-ivanti-solutions-ebook"&gt;digital experiences&lt;/a&gt;&amp;nbsp;across various devices and locations is falling short, preventing your organisation’s ability to effectively adapt to&amp;nbsp;Everywhere Work.&lt;/p&gt;

&lt;p&gt;When laying the foundation for an improved digital employee experience (DEX),&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ivi/2746/3b85c03540a6"&gt;consolidating your tech stack&lt;/a&gt; is a crucial component.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Why unmanaged tools and assets&amp;nbsp;are&amp;nbsp;hurting your DEX&amp;nbsp;&lt;/h2&gt;

&lt;p&gt;Some organisations have reported their digital transformation being&amp;nbsp;&lt;a href="https://www.helpnetsecurity.com/2022/01/11/accelerated-enterprise-digital-transformation/" rel="noopener" target="_blank"&gt;accelerated by three to five years&lt;/a&gt;&amp;nbsp;since 2020. Unlike a few years ago, assets no longer live just in the office. They are scattered across the globe and increasing in quantity. Recent reports show the average employee uses&amp;nbsp;&lt;a href="/en-au/resources/v/doc/ivi/2663/8abb292d288f"&gt;2.6 devices&lt;/a&gt;&amp;nbsp;to get their job done.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;But with more assets come more problems.&amp;nbsp;&lt;a href="/en-au/resources/v/doc/ivi/2663/8abb292d288f"&gt;45% of employees&lt;/a&gt;&amp;nbsp;have experienced more tech issues since 2020, with the average employee running into&amp;nbsp;&lt;a href="/en-au/resources/v/doc/ivi/2663/8abb292d288f"&gt;3.67 endpoint issues a day&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;This volume of daily issues means that valuable insights are growing fast and in different places.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Being able to navigate this complex environment in a timely manner to address all issues proactively poses a challenge when your tools and systems don't talk to each other.&lt;/p&gt;

&lt;p&gt;A more complex environment without the proper tools has IT and security professionals feeling the heat.&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;73% report an increased workload&lt;/a&gt;&amp;nbsp;since their organisation adopted hybrid/remote work.&amp;nbsp;In fact,&amp;nbsp;nearly&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;1 in 3 IT and security professionals&lt;/a&gt;&amp;nbsp;report losing at least one team member due to burnout.&lt;/p&gt;

&lt;p&gt;And these types of work environments aren’t going away anytime soon. According to our&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;Everywhere Work research&lt;/a&gt;:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&amp;nbsp;71% of office workers want to work either&amp;nbsp;hybrid (with control over which days they come to the office) or remote.&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;66% of employees say they have experienced no negative side effects due to remote work.&lt;/li&gt;
	&lt;li&gt;&amp;nbsp;71% of C-Suite admit hybrid working has had a positive impact on employee morale.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Some organisations are already&amp;nbsp;taking action. A recent&amp;nbsp;&lt;a href="https://rs.ivanti.com/reports/ema-modern-itam-in-the-modern-workplace-2022.pdf"&gt;survey conducted by EMA&lt;/a&gt;, found that a resounding&amp;nbsp;86% of respondents are looking to consolidate asset-related tools&amp;nbsp;and 18% are actively planning to manage all asset types on one platform.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&amp;nbsp;“Centralisation&amp;nbsp;is critical. Having too&amp;nbsp;many tools is an issue for us.”​&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;- System Administrator,&amp;nbsp;​CFCU Community Credit Union​&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;Consolidating your tech stack lays the groundwork for&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/products/automation"&gt;automation&lt;/a&gt;,&amp;nbsp;which helps decrease workloads and ultimately&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/take-care-of-your-team-improve-your-dex-to-combat-digital-burnouts-and-work-related-stress"&gt;deter digital burnouts&amp;nbsp;&lt;/a&gt;for your IT and security teams. With technology becoming more entwined with the daily&amp;nbsp;operations&amp;nbsp;of employees,&amp;nbsp;making sure you provide efficient ways to&amp;nbsp;manage, secure and support this environment for your IT teams is crucial to delivering improved experiences.&lt;/p&gt;

&lt;h2&gt;Benefits of consolidating your tech stack&lt;/h2&gt;

&lt;p&gt;Consolidating your tech stack aids DEX initiatives in many ways, including: &amp;nbsp;&lt;/p&gt;

&lt;h3&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Reducing complexity for your IT staff&lt;/h3&gt;

&lt;p&gt;It's time to kick manual processes and inefficient workloads to the curb. Connecting and simplifying your organisation’s workflows streamlines and automates your IT environments. This removes unnecessary complexity and enables improved experiences for your IT teams.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;More responsive and efficient IT support&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/resources/research-reports/2025-digital-employee-experience-report"&gt;28% of employees&lt;/a&gt;&amp;nbsp;wish for a more responsive service desk. When IT has all the information in a single place, they can address and resolve tickets quicker and more effectively.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Preventing issue before they happen&amp;nbsp;&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Quickly resolving issues and, ideally, preventing issues in the first place, creates betterexperiences.&amp;nbsp;Research shows it can take up to&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/v/doc/ebooks/ema-iva009a-ivanti-requirements-ebook"&gt;20 minutes for workers to refocus on a task&lt;/a&gt;.&amp;nbsp;When you simplify your tech stack and enable access to valuable insights in one place, preventing issues becomes a breeze. You get to keep employees out of the service queue and focused on their jobs, reclaiming thousands of hours of lost productivity across your organisation.&lt;/p&gt;

&lt;p&gt;When looking to create better employee experiences in the Everywhere Work era, consolidating your tech stack is a step you can’t afford to skip. Simplifying and streamlining your IT structure makes life easier for your IT and security teams&amp;nbsp;—&amp;nbsp;freeing up their time to understand employee sentiment, track and optimise experiences over time and prevent issues before they occur.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;To learn more about DEX, watch our on-demand webinar to&amp;nbsp;get&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2023/a-step-by-step-guide-to-planning-and-measuring-digital-employee-experience-dex" target="_blank"&gt;A step-by-step guide to planning and measuring digital employee experience&lt;/a&gt;.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 29 Jun 2023 15:25:35 Z</pubDate></item><item><guid isPermaLink="false">edcc8dd2-706e-4278-90fd-0922e309f05d</guid><link>https://www.ivanti.com/en-au/blog/how-to-use-generative-ai-for-knowledge-management</link><atom:author><atom:name>David Pickering</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/david-pickering</atom:uri></atom:author><category>Service Management</category><title>How to Use Generative AI for Knowledge Management</title><description>&lt;p&gt;In the blog&amp;nbsp;“&lt;a href="https://www.ivanti.com/blog/ai-knowledge-management-pros-cons-and-best-practices"&gt;How Generative AI Can Benefit Knowledge Management&lt;/a&gt;”, we looked at the benefits of AI to knowledge management to enhance the quality, automating the creation of content and enabling more engaging content. In enabling generative AI to become part of the knowledge management framework introduces concerns about accuracy, data bias, privacy and security.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Now, it’s time to look at how&amp;nbsp;we can&amp;nbsp;make it work well together...&lt;/p&gt;

&lt;h2&gt;How to use generative AI with knowledge management&lt;/h2&gt;

&lt;p&gt;Despite concerns of using generative AI in daily operations, this technology has the potential to be a powerful tool to optimise knowledge management. By carefully considering the&amp;nbsp;&lt;a href="https://www.ivanti.com/blog/ai-knowledge-management-pros-cons-and-best-practices"&gt;potential&amp;nbsp;drawbacks&lt;/a&gt; and taking steps to mitigate them, organisations can use generative AI to improve their knowledge management practices.&lt;/p&gt;

&lt;p&gt;Here are the five things to consider when using generative AI for knowledge management:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Making&amp;nbsp;sure to&amp;nbsp;&lt;strong&gt;identify the type of data&lt;/strong&gt; &lt;strong&gt;that will be used to train&lt;/strong&gt;&amp;nbsp;the generative AI model. Identification of the data type will help to ensure that the data used is accurate and reliable. Are you going to be using existing knowledge articles, incident data, problem data or combinations of all?&lt;/li&gt;
	&lt;li&gt;Having identified the data type, generative AI is only as good as the data&amp;nbsp;it's&amp;nbsp;trained on. The old saying ‘garbage in, garbage out’ still applies. Ensure that the data&amp;nbsp;you've identified&amp;nbsp;above is&amp;nbsp;&lt;strong&gt;accurate, complete and&amp;nbsp;up-to-date&lt;/strong&gt;.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Monitoring the output&lt;/strong&gt;&amp;nbsp;of the generative AI model for signs of bias, misinformation, completeness and accuracy. This can help to ensure that the information generated by the model is reliable.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Developing policies and procedures&lt;/strong&gt;&amp;nbsp;to manage the risks associated with using generative AI for knowledge management. This is an important step in ensuring the success of your project. These policies and procedures should address issues such as data security, privacy and ethical considerations. They should be designed to ensure that using generative AI for knowledge management is conducted in a responsible and ethical way.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Putting an&amp;nbsp;approval process&lt;/strong&gt;&amp;nbsp;in place before any knowledge information is shared publicly to ensure that the generated outputs are reviewed and authorised.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By taking these steps, organisations can use generative AI to improve their knowledge management practices while minimising the risks.&lt;/p&gt;

&lt;h2&gt;Combine generative AI and knowledge management with caution&lt;/h2&gt;

&lt;p&gt;The effectiveness and impact of generative AI on knowledge management will depend on how&amp;nbsp;it's&amp;nbsp;used and implemented.&amp;nbsp;It's&amp;nbsp;important to carefully evaluate the benefits and risks before deciding whether to incorporate it.&lt;/p&gt;

&lt;p&gt;Here are some potential pros and cons:&lt;/p&gt;

&lt;h3&gt;Pros&lt;/h3&gt;

&lt;h3&gt;&lt;strong&gt;1. Automatic generation of relevant content&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Generative AI can be used to automatically create knowledge articles from existing data sources, such as product documentation, customer support tickets&amp;nbsp;and&amp;nbsp;employee training materials.&lt;/p&gt;

&lt;p&gt;With&amp;nbsp;&lt;a href="https://www.ivanti.com/resources/research-reports/everywhere-work-report"&gt;32% of IT professionals&lt;/a&gt;&amp;nbsp;reporting an increase in helpdesk tickets since the move to remote working, there’s a significant opportunity for enhancement of the knowledge base that can enable quicker and more effective issue resolution, freeing up IT professionals to focus on more strategic tasks, such as developing new knowledge management initiatives and improving the quality of existing knowledge articles.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;2. Improved search accuracy&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Generative AI can help improve search accuracy by personalising the delivery of knowledge to employees, based on their individual needs and preferences. With an &lt;a href="https://venturebeat.com/business/report-employees-spend-3-6-hours-each-day-searching-for-info-increasing-burnout/#:~:text=Special%20Issues%20Jobs-,Report%3A%20Employees%20spend%203.6%20hours%20each,searching%20for%20info%2C%20increasing%20burnout" rel="noopener" target="_blank"&gt;average employee spending&amp;nbsp;3.6 hours a day&lt;/a&gt;&amp;nbsp;searching for information, any time savings in the way knowledge is delivered to them is a win.&lt;/p&gt;

&lt;p&gt;Enabling easier and quicker access to&amp;nbsp;information will ultimately enhance&amp;nbsp;your employees’ digital experience.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;3. Enhanced automation&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Generative AI can assist in automating&amp;nbsp;routine task – even if it's&amp;nbsp;not directly related to the creation of knowledge management articles.&lt;/p&gt;

&lt;p&gt;With&amp;nbsp;&lt;a href="https://rs.ivanti.com/reports/ema-modern-itam-in-the-modern-workplace-2022.pdf"&gt;85% of IT professionals&lt;/a&gt;&amp;nbsp;rating automation and AI investments as profitable ventures, identifying new ways of streamlining their processes can free up time for IT professionals to focus on more complex issues.&lt;/p&gt;

&lt;h3&gt;Cons&lt;/h3&gt;

&lt;h3&gt;&lt;strong&gt;1. Risk of misinformation&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Generative AI can potentially produce incorrect or misleading information, which can lead to serious consequences in the IT field. For example, the introduction of malware, or the incorrectly recommending turning off functionality which is used to secure the IT environment from malicious actors.&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;2. Dependence on AI-generated content&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;If companies become too reliant on AI-generated content, they may not prioritise the human-generated one or critical thinking skills, leading to a potential loss of expertise. Despite all the discussion around generative AI, human oversight is still required to validate accuracy and approve the generated information.&amp;nbsp;&lt;/p&gt;

&lt;h3&gt;&lt;strong&gt;3. Ethical concerns&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;There are ethical concerns surrounding the use of generative AI, like potential bias in the data used to train the model, which can perpetuate existing inequalities.&lt;/p&gt;

&lt;p&gt;There’s no doubt that generative AI can be a valuable tool for IT knowledge management and&amp;nbsp;while&amp;nbsp;a new exciting technology,&amp;nbsp;there's&amp;nbsp;still much to be learned about the benefits and pitfalls that it may bring.&lt;/p&gt;

&lt;p&gt;Each organisation needs to review the potential impact individually and choose an appropriate AI solution that meets their own need for privacy, accuracy and security.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Tips for implementing generative AI for knowledge management&lt;/h2&gt;

&lt;h3&gt;Start small and scale up&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;It's better to start with a small pilot project and then scale up using generative AI as you gain experience.&lt;/p&gt;

&lt;h3&gt;Get buy-in from stakeholders&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;It's important to get buy-in from stakeholders before deploying generative AI in production. This will help ensure that the model is used effectively and that its outputs are trusted.&lt;/p&gt;

&lt;h3&gt;Monitor the model's performance&lt;/h3&gt;

&lt;p&gt;It's important to monitor the model's performance after it's been deployed in production. This will help identify any potential problems with the model and improve the model's accuracy.&lt;/p&gt;

&lt;h3&gt;Continuously improve the model&amp;nbsp;&lt;/h3&gt;

&lt;p&gt;Generative AI models are constantly being improved. It's important to continuously enhance the model by retraining it on new data and addressing any potential problems that may occur.&lt;/p&gt;

&lt;p&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;

&lt;p&gt;Learn more about this topic –&amp;nbsp;watch our webinar on&amp;nbsp;&lt;a href="https://www.ivanti.com/webinars/2023/generative-ai-for-infosec-hackers-what-security-teams-need-to-know" target="_blank"&gt;Generative AI for InfoSec &amp;amp; Hackers: What Security Teams Need to Know&lt;/a&gt;.&lt;/p&gt;
</description><pubDate>Tue, 27 Jun 2023 14:30:00 Z</pubDate></item><item><guid isPermaLink="false">84544fde-a86c-4019-b3c3-fb2787d5852f</guid><link>https://www.ivanti.com/en-au/blog/how-it-device-discovery-can-identify-your-network-s-assets-and-vulnerabilities</link><atom:author><atom:name>Steve Feldstein</atom:name><atom:uri>https://www.ivanti.com/en-au/blog/authors/steve-feldstein</atom:uri></atom:author><category>Service Management</category><title>How IT Device Discovery Can Identify Your Network's Assets and Vulnerabilities</title><description>&lt;p&gt;The security of your organisation’s network is paramount to its success. With the ever-changing landscape of cyber threats, it's important to take the necessary steps to ensure that your network is secure and compliant with industry regulations.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Ensuring compliance requires you to know what’s on your network. But how can that be done when only&amp;nbsp;&lt;a href="/en-au/resources/v/doc/ivi/2732/7b4205775465"&gt;48% of leaders and security professionals&lt;/a&gt;&amp;nbsp;say they run their asset discovery program at least once per week?&amp;nbsp;One of the most effective tools for identifying assets and vulnerabilities on a network is IT asset discovery.&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;What is IT discovery and why is it important for IT security?&lt;/h2&gt;

&lt;p&gt;IT discovery is the process of identifying and cataloging the various hardware, software and other components that make up an IT infrastructure. This is an essential process to ensure the smooth functioning of IT networks as it allows IT administrators to identify potential issues and plan for future growth.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Once this identification and cataloging of IT inventory is completed, you can maintain a comprehensive inventory of all your assets.&amp;nbsp;Keeping track of all the components making up your network in one place means IT administrators can quickly identify any problems and take the necessary steps to fix them.&lt;/p&gt;

&lt;p&gt;And since,&amp;nbsp;on average, up to&amp;nbsp;&lt;a href="https://comparesoft.com/asset-management-software/eliminate-ghost-assets/" rel="noopener" target="_blank"&gt;30% of an organisation’s IT assets&lt;/a&gt;&amp;nbsp;are ghost assets,&amp;nbsp;missing or unaccounted for,&amp;nbsp;it is even more important to have accurate, up to date information about your device landscape.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;To quickly detect changes in the network and respond to potential&amp;nbsp;threats,&amp;nbsp;it’s worth automating the discovery process&amp;nbsp;—&amp;nbsp;ultimately,&amp;nbsp;it'll&amp;nbsp;ensure&amp;nbsp;a secure and compliant network. &amp;nbsp;&lt;/p&gt;

&lt;h2&gt;How does IT discovery work?&lt;/h2&gt;

&lt;p&gt;IT discovery&amp;nbsp;typically uses manual scanning or automated scanning tools. Manual scans involve manually entering IP addresses into a scanner, while automated scans are done with specifically designed software programs. These programs will search through an organisation's environment, looking for:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;Hardware components such as computers, servers, routers and switches.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Software components such as operating systems and applications.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;Network connections such as LANs (Local Area Networks) or WANs (Wide Area Networks).&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Additionally, as not every asset will be on the network, the ability to discover devices from other sources via connectors is just as critical in providing a comprehensive picture of your entire IT estate.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;h2&gt;Benefits of IT discovery for IT security&lt;/h2&gt;

&lt;p&gt;Accurate device information is an essential component of any organisation’s IT network. Without it, organisations are unable to identify and track assets on their networks or ensure compliance with relevant regulations and standards.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;By automating the process of discovering devices connected to your&amp;nbsp;network,&amp;nbsp;you can capitalise on the following benefits:&amp;nbsp;&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Provide real-time alerts regarding any changes in the device inventory&lt;/strong&gt;.&amp;nbsp;This kind of visibility can help your organisation quickly detect potential threats and respond accordingly. With accurate device information, identifying unknown assets and reducing attack surface by removing outdated or unauthorised hardware.&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Ensure that a network is compliant with relevant security regulation&lt;/strong&gt;s&amp;nbsp;and standards such as GDPR (General Data Protection Regulation), PCI DSS (Payment Card Industry Data Security Standard), HIPAA (Health Insurance Portability and Accountability Act) and CCPA (California Consumer Privacy Act).&amp;nbsp;&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Accurately monitor the performance of IT infrastructure and ensure that it always remains secure&lt;/strong&gt;.&amp;nbsp;With real-time visibility into all the devices connected to the network, your IT team can easily identify problems, even before they become critical issues, and respond quickly when issues arise. This helps reduce downtime for employees, which in turn leads to improved productivity and employee experience across the organisation.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Respond&amp;nbsp;Quickly to Potential Threats&lt;/h2&gt;

&lt;p&gt;When responding to potential threats, it’s important for organisations to act quickly to minimise the impact of the attack. With extended visibility into your entire network, you can quickly locate any malicious actors or vulnerabilities that could lead to an attack.&lt;/p&gt;

&lt;p&gt;This also allows for more accurate and timely monitoring of changes in your network's architecture, which are critical in identifying potential weaknesses before exploitation can occur.&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Additionally, keeping track of who has access to what parts of your network makes monitoring user activities and maintaining up-to-date user profiles a breeze. With threat actors getting better at disguise, ensuring that only authorised personnel have access to the information they need helps reduce the risk of any unauthorised access or misuse.&lt;/p&gt;

&lt;p&gt;And if a threat occurs, it’s much easier to determine where it originated from and take appropriate action against it.&amp;nbsp;&amp;nbsp;&lt;/p&gt;

&lt;p&gt;Finally, providing valuable insights into how your organisation is responding to potential threats can help improve your security strategy. By measuring response time and tracking incidents over time, you can evaluate which strategies are working best and which ones to amend.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hungry for more? Watch our webinar recording and explore&amp;nbsp;&lt;a href="https://www.ivanti.com/en-au/webinars/2022/vulnerability-management-irl-5-best-practices-from-real-world-rbvm-programs"&gt;5 Best Practices From Real‑World RBVM Programs&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;</description><pubDate>Thu, 22 Jun 2023 20:09:10 Z</pubDate></item></channel></rss>