A Customer Centric Approach to Patching Systems

Many organizations believe they are focused on serving the needs of their customers. They evaluate customer wants and desires and identify the functionality needed to meet these needs. Software developers identify updates and new releases while network administrators plan system upgrades and migrations. This approach of rolling out phases, issuing new releases, and upgrading networks used to work in the past when customers were focused on features and functionality. As more and more customers are concerned about security, a new approach is needed.

A Lesson From Microsoft

When Microsoft issues a new product, their software is often identified by the year of release. For example, Windows 95, Windows 98, Exchange Server 2013, and Microsoft Office 2013. Like most software, over time vulnerabilities are discovered. Many years ago Microsoft included security fixes with new functionality updates (Service Packs). By applying a Service Pack, a customer would address all known vulnerabilities up to the date of the Service Pack. Microsoft's customers soon found that vulnerabilities needed to be addressed more quickly and couldn't wait for the next Service Pack. Microsoft reviewed the needs of its customers and developed the concept of "Patch Tuesday".

On the second Tuesday of each month, Microsoft released software patches to address vulnerabilities. This too worked for a while until Microsoft discovered that customers didn't want to wait a full month to have software patched. More recently, Microsoft has moved to a rolling model of releasing patches on a weekly basis. Patches to critical vulnerabilities are now released immediately and customers do not have to wait for the weekly updates.

Network Platforms

Application software does not exist in an isolated environment. It resides on hardware and relies on the underlying operating system and other related applications (e.g. databases). These too can have vulnerabilities and must be patched and updated in a timely manner.

Migrating to a Customer Centric Approach

Migrating to a customer centric (i.e. customer focused) approach requires that application developers, system and network administrators, Chief Security Officers (CSO), and organization management prioritize security efforts and not wait for the next rollout of software and hardware releases. This change in mind set from functionality/features to security may not happen overnight, but it needs to happen for many of your customers (internal and external) that need to meet compliance requirements and industry standards.

The following steps help migrate to a customer focused organization:

Summary

Migrate to a customer centric approach and ensure that high and medium priority issues are addressed within 30 days of notice of the vulnerabilities. As Bill Gates once said ""Security is, I would say, our top priority because for all the exciting things you will be able to do with computers - organizing your lives, staying in touch with people, being creative - if we don't solve these security problems, then people will hold back.

Network security audits and web application security audits help identify unpatched systems.

Security Blog
verified If You Want a "Security Audit"
You Need a Certified Auditor.
Certified Information Systems Auditors

Unlike a security consultant, Altius IT is certified as a Certified Information Systems Auditor to perform a security audit of your environment and issue reports and recommendations to secure your systems. After your audit, Altius IT's Auditor Opinion Letter and Secure Seal let your clients and prospects know you meet security best practice/compliance requirements.

See our In the News page for video clips of our experts on national television as well as over 40 publications featuring Altius IT. In addition to our auditor certifications we hold many security, technical, and project management credentials. More information is available on our About Us page.

Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your information systems, applications, and network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets