The most Vulnerable are usually impacted the greatest
In life, it is an unfortunate situation that the most vulnerable are open to the worst predatory acts by people with malicious intent. The same is true for organisations’ networks. The more vulnerabilities that exist within a network, the greater the chance malicious actors will target and breach that network.
The Australian Information Security Manual identifies vulnerability management as key component of the mitigation strategies that help protect Australian Government Agencies and businesses from cyber security risks. Out of 37 strategies to mitigate cyber security incidents, there are more than 12 sections that include or mention vulnerability awareness, assessment, discovery, management or remediation.
The IT community has a duty to our customers to ensure their networks, applications and web presence are as free from vulnerabilities as we can make them.