A new report suggests many organizations are failing in the basic cybersecurity hygiene efforts and leaving themselves exposed to attackers. Credit: Getty Images It takes too long to identify and remove unauthorized devices from networksNew devices on the network may be harmless; new users or guests simply connecting their personal phones. However, unknown devices could also be attackers trying to access your network.Sixty-two percent of the respondents said It takes their organizations hours at best to detect new devices on the network, and hours on top of that to remove any unauthorized devices. All it takes is one malicious attacker to be connected for a few minutes to start potentially causing damage. Organizations need accurate inventory of authorized devices and network level authentication to prevent unauthorized connection.Failure to police what software is allowed to run on their networkImage by Getty modified by IDG Comm.We may live in an age of self-service, but shadow applications still pose a danger to networks. Verifying the veracity of applications – and reducing the chance of malware or corporate data leaking out — is made much easier if you actually know what software is running on your networks.Thirty percent of organizations have less than half of the software on their network tracked in an asset inventory. It takes over 80 percent of organizations hours or longer to detect and remove unauthorized software from their network. Application whitelisting ensures only authorized software runs on the network and reduces the chances of malicious apps and software entering your organization.Infrequent vulnerability scans and slow patchingImage by Getty modified by IDG Comm.While the most advanced attacks can avoid detection, most come from known and detectable vulnerabilities. While the vast majority of companies run vulnerability scans, 41 percent do so monthly or quarterly rather than on a weekly or daily basis. Among organizations that have implemented DevOps, 46 percent aren’t scanning for vulnerabilities throughout the continuous integration and deployment (CI/CD) pipeline.When it comes to patching, the sooner it’s done, the sooner you’ve closed a hole in your defenses. Unfortunately, 44 percent of companies say it takes weeks to apply security patches, with nearly 30% taking a month or more. Vulnerability scans should be supported with patch management systems that cover both the operating system and third-party applications in order to achieve automatic and ongoing installation of updates.Infrequent vulnerability scans and slow patchingImage by Getty modified by IDG Comm.While the most advanced attacks can avoid detection, most come from known and detectable vulnerabilities. While the vast majority of companies run vulnerability scans, 41 percent do so monthly or quarterly rather than on a weekly or daily basis. Among organizations that have implemented DevOps, 46 percent aren’t scanning for vulnerabilities throughout the continuous integration and deployment (CI/CD) pipeline.When it comes to patching, the sooner it’s done, the sooner you’ve closed a hole in your defenses. Unfortunately, 44 percent of companies say it takes weeks to apply security patches, with nearly 30% taking a month or more. Vulnerability scans should be supported with patch management systems that cover both the operating system and third-party applications in order to achieve automatic and ongoing installation of updates.Infrequent vulnerability scans and slow patchingImage by Getty modified by IDG Comm.While the most advanced attacks can avoid detection, most come from known and detectable vulnerabilities. While the vast majority of companies run vulnerability scans, 41 percent do so monthly or quarterly rather than on a weekly or daily basis. Among organizations that have implemented DevOps, 46 percent aren’t scanning for vulnerabilities throughout the continuous integration and deployment (CI/CD) pipeline.When it comes to patching, the sooner it’s done, the sooner you’ve closed a hole in your defenses. Unfortunately, 44 percent of companies say it takes weeks to apply security patches, with nearly 30% taking a month or more. Vulnerability scans should be supported with patch management systems that cover both the operating system and third-party applications in order to achieve automatic and ongoing installation of updates.Infrequent vulnerability scans and slow patchingImage by Getty modified by IDG Comm.While the most advanced attacks can avoid detection, most come from known and detectable vulnerabilities. While the vast majority of companies run vulnerability scans, 41 percent do so monthly or quarterly rather than on a weekly or daily basis. Among organizations that have implemented DevOps, 46 percent aren’t scanning for vulnerabilities throughout the continuous integration and deployment (CI/CD) pipeline.When it comes to patching, the sooner it’s done, the sooner you’ve closed a hole in your defenses. Unfortunately, 44 percent of companies say it takes weeks to apply security patches, with nearly 30% taking a month or more. Vulnerability scans should be supported with patch management systems that cover both the operating system and third-party applications in order to achieve automatic and ongoing installation of updates. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe