“We have been working closely with experts from both Cognisys and Impact IT to identify and remediate vulnerabilities in our estate. In five months, we have reduced by over 70% and have clear line of sight on Critical and Exploitable vulnerabilities and plans in place to action. After penetration testing and Cyber Essentials Plus this is definitely a key area that businesses need to have visibility and action on – ahead of phishing in how “bad actors” access a business through software vulnerabilities! Managed by our own IG team we keep close tabs on this key threat management vector, but it takes all three parties pulling together to succeed here.”
Businesses rely heavily on computer systems to store, process and transmit sensitive data. To ensure the security and integrity of this information, it is crucial for business to regularly assess their IT infrastructure and identify vulnerabilities that could be exploited by malicious actors, especially those know to be currently exploited around the world.
Impact IT have engaged with one of their customers (Liaison Group) and have made huge strides in hardening their security, reducing exposure to known vulnerabilities by identifying and updating out-of-date software and restricting access to administrative functions. Data is reported to a web-based dashboard that both Impact IT and Liaison Group have access to, with which they can filter and verify results.
Vulnerability scanning can identify and be used to remedy:
To address these challenges, Liaison Group decided to implement a comprehensive vulnerability scanning program across its IT infrastructure. This tool is installed across the estate and checks in daily to a web-based dashboard, with trends and reporting available to show progression.
The vulnerability scanning tool was used to scan for known vulnerabilities, particularly in software applications, operating systems, and network configurations.
The scanning tool provided a risk assessment of each vulnerability, especially those known to be currently exploited, allowing the IT team to prioritise remediation based on the severity and potential impact on the organisation.
The benefits of vulnerability scanning are:
If your IT department or MSP is responsible for keeping your systems up to date, speak with them about what this means specifically. Patching Windows and Office applications is only one small part of keeping your endpoints up to date, for example, does your IT support provider track the version of and patch 3rd party applications such as Zoom, Chrome, Firefox and Skype? These applications do not necessarily keep themselves up to date.
The implementation of vulnerability scanning at Liaison proved to be a proactive and patching outdated software and addressing vulnerabilities in a systematic manner, Liaison enhanced its overall cybersecurity posture. This case study demonstrates the tangible benefits of vulnerability scanning in a corporate environment, highlighting the stakeholders in an ever-evolving threat landscape.
Discover how our IT solutions can help you succeed through technology. Get in touch for a custom quote, expert guidance, or to start a conversation with our team.