Options for Surviving Critical Zero-Day Exploits
by Brent Kirkpatrick
(Date Published: 5/29/2018.)
During the critical zero-days, security people explain a vulnerability in detail to each other and hackers have access to the discussions. Vulnerabilities are posted to the CVE database and are graded for how critical they are. Hackers receive a tutorial on how to exploit the critical vulnerabilities and freely do so until a patch stops them.
If your security policies rely only on updates, then your network will be unprotected from critical zero-day exploits. You will be unprotected even if you update every computer on your network the moment a patch becomes available. A patching-only security policy is vulnerable.
There are several options for security during the critical zero-days. First, there is preventative security measures, such as those found in our defendIT (TM) support package. Second, there is incident response in the face of intrusions.
Contact Intrepid Net Computing if you want to discuss your options for security.
defendIT (TM). AI-driven incident response measures derived from security incident data.