According to data from the National Institute of Standards and Technology’s (NIST) National Vulnerability Database (NVD), 7,038 new security vulnerabilities were added to the database in 2014, which is just above an average of 19 vulnerabilities a day. In this same year, 24% of the found and reported vulnerabilities were deemed severe. The problem, is that in 2013, only 4,794 vulnerabilities were reported, and 1,612 were designated high. The percentage may have gone down from 2013 to 2014, but the number of reported high severity vulnerabilities is up to 1,705.
The largest source of vulnerabilities was found in third-party applications, boasting about 80% of those reported. On the other hand, while this is a staggering number, operating systems were only responsible for 13%. The problem here, is operating systems are used across industries. Apple’s operating systems were at the top of the list, with Mac OS X contains 64 reported severe vulnerabilities, and iOS containing 32, which are also all severe. Microsoft Windows is labeled as containing less, having only 25 high vulnerabilities.
So, what does all this mean? Vendor management is a critical piece of security, and having knowledge of the extremely high amount of vulnerabilities requires IT and system administrators to continue patching systems with the latest updates as soon as they are released.
4 items that should be prioritized for patching are:
✓Operating systems:
✓Web browsers
✓Java
✓Free Adobe products.
REFERENCES
http://www.gfi.com/blog/most-vulnerable-operating-systems-and-applications-in-2014/
Related articles
The NSA Cybersecurity Guide for Remote Workers
In this blog post, we cover a few key recommendations for remote workers from the NSA guide, ‘Best Practices for Securing Your Home Network.’
GraVoc Recognized on CRN’s 2023 MSP 500 List
CRN®, a brand of The Channel Company, has named GraVoc to its Managed Service Provider (MSP) 500 list in the Pioneer 250 category for 2023!
The Cybersecurity Implications of ChatGPT
Is ChatGPT a security risk? In this blog post, we explore the cybersecurity implications of ChatGPT, including the benefits and challenges.