You could tell that the SQL Slammer infestation was a biggie just by the volume of self-congratulatory e-mail from vendors claiming to have the problem licked. When people start yelling that everything is under control, that’s when you start to worry. Informal polling around our offices reveals a volume of Slammer-related messages vastly higher than that which followed earlier viral or vermicular outbreaks. Must have been a lot of folks caught unprepared for this one.In downtown Boston there’s an apartment complex with a famous sign outside, facing one of Beantown’s many traffic bottlenecks. The sign reads, “If you lived here, you’d be home now.” Much of the e-mail regarding the SQL Slammer worm was roughly in that vein: “If you had used MonkeyMax DMZ, you wouldn’t have had any Slammer issues!” But the truth is a little weirder than the lack of MonkeyMax DMZ (for those eager to get some, I made it up). The vulnerability was well-known, and the patch to fix it has been widely available since last summer, when Microsoft released it along with a critical security bulletin. The half million or so vulnerable servers were found in enterprises where somebody hadn’t gotten around to applying the patch. What could explain this?At first blush, one might conclude that the sign should instead read: “If you weren’t such a worthless dope, you wouldn’t have had any Slammer issues!”Much of the semiflaming Slammer debate, as seen in postings on various websites, pitted people who reject Microsoft and all its allegedly invidious works against those who think network admins (or anyone else who’s handy to be blamed) are lazy dogs who ought to show a lot more attention to detail. Amid the charges and countercharges are some undeniable gray-scale realities. The patch, it turns out, is somewhat harder and less convenient to install than its Band-Aidy name would imply. It can require taking a (sometimes mission-critical) system offline for hours and can interact badly with applications that haven’t been updated to accommodate it. So laziness is not quite the right characterization of those responsible for the afflicted servers. For those facing the need to prioritize investments of time and effort (some leading to considerable inconvenience for users and businesses), gambling becomes one of the tools of the trade. Naturally, snake eyes can sometimes be the result. In the Shoemaker’s Barefoot Children Dept., even Microsoft’s own internal network had servers getting whacked by the worm. The irony of this must be delicious for combatants on both sides of the issue. But if Microsoft can’t get its own act together with respect to the patch application, how can the company credibly level its finger at the legions of similarly ill-prepared customers?In a world in which nearly every single piece of technology is complicated, most networked environmentsconsisting of many thousands of single pieces, often oddly matched and haphazardly assembledare so byzantine as to defy all reasonable efforts to keep up with maintenance and repair. SQL Slammer is a fresh reminder that to gamble on risk is to flirt with disaster. CSOs who are not now entirely comfortable with the policies and procedures their enterprises follow in applying and testing the patch should quickly remediate this area of risk. Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe