Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Is Patching a Double-Edged Sword?

By Mark Kedgley
patching-cyberenews
August 2, 2018

Sometimes you can’t win. Patching, and the right time and process for doing so, is very much a case in point.

Patching used to need more planning and manual intervention, but as internet access has improved, many manufacturers now provide built-in Updater Services. Microsoft have taken this further, resorting to patch-guerilla tactics: Ambush Updates. They know what’s best for you, and if you won’t restart your PC then they will. Usually this will always be when it’s least convenient for you, such is Murphy’s Law.

It leaves many simply shrugging their shoulders and letting nature take its course. Better to let systems self-update, then clear up the mess if and when problems arise. It’s a simple risk/benefit assessment and much like attitudes to security breaches, if you’ve been lucky enough to avoid the expense and hassle so far, you probably assume it will never happen.

For the software producer, the chief concern is with making sure products are secure. The convenience for the user and any consideration for the impact on other software is secondary. That’s not to say a manufacturer won’t test their updates before releasing them, but guaranteeing success for everyone across an endless variety of unique IT environments is impossible.

At one end of the spectrum, anti-virus systems must update on-demand to maintain protection. Similarly, browsers and email clients – overwhelmingly the “front door” for malware attacks – will also need regular, time-critical updates. Then there are aligned technologies, such as Java and Adobe, equally super-common mediums for attacks and always in need of patches. The most recent Verizon Breach Report records Java as the most common first-stage malware vector.

Even at this level there should be a consideration towards software inter-dependencies, but moving up the software-scale in terms of complexity, towards operating systems and databases, patching becomes much more risky. How much can you rely on siloed manufacturers to guarantee full-compatibility for your “mission-critical” applications?

Case Study: One banking client of ours has concluded that safety-first patching for them means “Don’t patch.” They run an important application on RHEL 5, even though the platform was retired last year. Chances are the application could work, or be made to work, on the more secure and better performing RHEL 7, but nobody wants to roll the dice.

And with good reason. Just recently according to Computerworld, Windows 10 patches have introduced problems with RDP operation (CredSSP) and disastrously affected various SSD drives, while for Windows 7, patches mistakenly removed support for certain network interface cards.

So patching still carries risk, just that for most, the potential operational problems are outweighed by the security jeopardy. Everyone knows about WannaCry and its rapid worldwide proliferation, exploiting the Eternal Blue SMB vulnerability. It’s a stark example of why patches should be applied without delay. Updates to remediate the vulnerability had been available for weeks, but for many, the opportunity was missed.

But there are other good reasons to delay patching, also in the interests of security. A pre-rollout test will save hassle in the long run and is a standard practice for many. By deploying updates to isolated test systems first, or to your most tolerant, IT-savvy users (a.k.a. Lab Rats), you can head-off problems before rolling out patches to all devices. For the sake of a brief hiatus, you strike a good balance between functional and security risks.

And what are the Security Best Practice recommendations for patching? Security control frameworks, such as the CIS Controls, are based on decades of thinking by the best brains in cybersecurity, and we should take these into account. Even though a Change Management process isn’t as much fun as installing a new security gadget, it can be just as valuable for keeping you safe. By embracing the concept of Change Control, you specify when changes are going to be made and, more valuably, you know when changes shouldn’t be seen. The upside? Unplanned changes –  including breach activity – are highlighted and isolated from intentional, approved changes.

Contemporary system/file integrity monitoring technology can be automated to intelligently identify patterns of changes, classified as “known safe.” When integrated with your ITSM platform, this means change control needn’t be a dreary bureaucratic burden of change approvals and forward planning. Taking things further, you can also leverage “second opinion” sources of threat intelligence, such as file whitelists, to automatically analyze and approve change activity. It means you can operate with the flexibility to make changes when needed, and still benefit from change control. A win-win, at last.

KEYWORDS: cyber risk management data breach endpoint security patch management ransomware

Share This Story

Mark Kedgley is Chief Technical Officer at New Net Technologies (NNT) where he is responsible for driving ongoing product development; his primary objective being to continually push NNT’s data security and compliance solutions to protect their customers’ sensitive data against security threats and network breaches in the most efficient and cost effective manner, whilst being easier to use than anything else out there in the market.

Mark has been CTO at NNT since 2009, and has over 20 years’ experience in IT business development and sales. Mark combines a visionary yet pragmatic approach to IT: combining not just the ability to analyze business issues and scope technological solutions to address needs, but to also deliver product that is both fit-for-purpose and future-proof.

https://uk.linkedin.com/in/markkedgley

https://twitter.com/Change_Tracker

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Chatbot prompt screen

8 in 10 AI Chatbots Likely to Help Plan Attacks, Hate Crimes

Head in front of monitors

Ransomware Response: How Businesses Regain Control Under Pressure

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing