Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

U.S. Government Taking Steps Toward Protecting Data

U.S. Government Taking Steps Toward Protecting Data

Do you remember the series of high-profile infrastructure attacks that occurred not so long ago this year? Well, now the United States government is taking matters into its own hands by ordering the patching of various vulnerabilities in affected systems. It’s a massive effort to thwart hackers and other cyberthreats from taking root in vulnerable systems.

This directive was issued by the Cybersecurity and Infrastructure Security Agency (CISA), and it has due dates ranging from November of 2021 all the way to May of 2022. CISA is pushing for all federal agencies and organizations to resolve a certain series of known, exploited vulnerabilities during this timeframe, with some notable exceptions for national security-related infrastructures.

This catalog of known, exploited vulnerabilities can be found on CISA’s website. The catalog includes all sorts of information on each known vulnerability, and all of them (around 300 or so) are believed to pose some sort of risk to the federal government. This catalog also contains links to the NIST database for guidance on how to apply patches and resolve these vulnerabilities.

This is a massive undertaking and one that will inevitably lead to some confusion as patches are deployed and administered—especially since each of the departments are responsible for deploying their own updates and are only accountable to CISA. That said, CISA is putting some pressure on these organizations to meet specific objectives and requirements within a set amount of time.

The timeline for deploying these patches and updates varies, but within 60 days, agencies must review and update their policies on vulnerability management. These policies and procedures must then be furnished upon request. Agencies must also have a policy in place for deploying the directive from CISA, a process that is incredibly involved. Organizations will have to identify who is responsible for what, as well as how they plan to track and report on the implementation process.

Patch management can be difficult for governments, but it’s even more challenging for small businesses that don’t have the seemingly limitless spending power and other resources afforded to larger organizations and enterprises. Instead of resolving issues that need to be resolved, SMBs tend to get around to patching things as they have the time and manpower to do so. This is not the correct approach, as every day you wait to patch vulnerabilities on your system is another day that a hacker could exploit them.

Voyage Technology can make the patch implementation process easy. We can automatically or remotely deploy patches and security updates to your organization’s hardware and software solutions without an on-site visit. This makes our services so easy and convenient that you’ll never consider ignoring a patch or security warning again.

To learn more about our security services, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 01 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer Collaboration IT Services Hosted Solutions Users Mobile Device Ransomware Quick Tips Microsoft Workplace Strategy Cybersecurity Small Business Passwords Communication Data Backup Smartphone Backup Saving Money VoIP Android Business Management Smartphones Upgrade communications Mobile Devices Disaster Recovery Data Recovery Managed Service Browser Managed IT Services Social Media Microsoft Office Windows Remote Network Tech Term Internet of Things Current Events Facebook Automation Artificial Intelligence Productivity Cloud Computing Covid-19 Remote Work Server Managed Service Provider Miscellaneous Gadgets Outsourced IT Holiday Information Employee/Employer Relationship Encryption Spam AI Windows 10 Office Government Data Management Training Compliance Business Continuity Windows 10 Wi-Fi Virtualization Business Technology Blockchain Bandwidth Mobile Office Data Security Two-factor Authentication Apps Vendor Apple Networking App Mobile Device Management Gmail Managed Services Voice over Internet Protocol Employer-Employee Relationship Chrome Budget Applications Avoiding Downtime How To Marketing BDR BYOD Conferencing Computing WiFi Information Technology Access Control Office 365 Tip of the week Hacker Router Bring Your Own Device Managed IT Services Website Help Desk Operating System Risk Management Healthcare Virtual Private Network Big Data Health Analytics Office Tips IT Support Augmented Reality Retail Storage Computers HIPAA Password Scam Data loss Windows 11 Monitoring 2FA Going Green Patch Management Save Money Firewall Remote Monitoring End of Support Excel Vulnerability Vendor Management Cybercrime Remote Workers The Internet of Things Telephone Display Printer Social Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Document Management Microsoft 365 Customer Service Solutions Mouse Employees Integration Wireless Technology User Tip Administration Modem Mobile Security Processor Holidays Word Data Storage Robot Smart Technology Supply Chain Video Conferencing Settings Managed Services Provider Wireless Printing Saving Time Virtual Machines Content Filtering Professional Services IT Management YouTube Meetings Safety VPN Physical Security Managed IT Service Cryptocurrency Downloads Computer Repair iPhone Licensing Virtual Desktop Data storage Entertainment LiFi Vulnerabilities Data Privacy Outlook Images 101 Customer Relationship Management Machine Learning Money Telephone System Multi-Factor Authentication Mobility Humor Cost Management Hacking Presentation Maintenance Sports Antivirus Education Trend Micro Social Engineering Specifications Security Cameras Workplace Strategies Fraud Meta Microchip Internet Exlporer Software as a Service Remote Computing Username Managing Costs Amazon IP Address Mobile Computing Tablet eCommerce Search Black Friday SSID Virtual Assistant Outsource IT Best Practice Database Surveillance Alert Buisness File Sharing IT Technicians Virtual Machine Environment Dark Data Media Recovery Managed IT Hard Drives Legal Proxy Server Reviews IT solutions Cookies How To Cyber Monday Medical IT Hotspot Transportation Small Businesses Domains Business Growth Tactics Development Notifications Travel Mirgation Hypervisor Displays Refrigeration Techology Shopping Google Maps Nanotechnology Optimization Cortana PowerPoint Language Employer/Employee Relationships Outsourcing Public Speaking Alt Codes Addiction Management PCI DSS Downtime Unified Threat Management Chatbots Navigation Lithium-ion battery Unified Threat Management Entrepreneur Gig Economy Hosted Solution Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Typing Service Level Agreement Internet Service Provider Regulations Compliance Identity Network Congestion Evernote Paperless Undo Google Drive User Error Bookmark Smart Tech Memes Knowledge Co-managed IT Alerts SQL Server Technology Care Download Net Neutrality Financial Data Point of Sale History 5G Business Communications Google Docs Browsers Smartwatch Unified Communications Connectivity IT Experience Break Fix Scams Azure Hybrid Work Bitcoin Network Management Upload Procurement Running Cable Tech Support Social Network Telework Cyber security Monitors Multi-Factor Security Tech Human Resources Application Google Wallet CES IoT Communitications Dark Web Cables IBM Windows 8 Trends Supply Chain Management Laptop Websites Customer Resource management FinTech Regulations Google Calendar Term Google Apps Drones SharePoint Data Analysis Star Wars IT Assessment Electronic Medical Records Microsoft Excel IT Maintenance Staff Value Business Intelligence Gamification Flexibility Halloween Lenovo Organization Social Networking Writing Legislation Shortcuts Competition Fileless Malware Digital Security Cameras Smart Devices Virtual Reality Ransmoware Scary Stories Private Cloud Wearable Technology Memory Vendors Hacks Server Management Content Remote Working Superfish Health IT Identity Theft Motherboard Data Breach Fun Comparison Google Play Be Proactive Directions Videos Deep Learning Assessment Electronic Health Records Twitter Permissions Workforce Error Wasting Time Threats User

Blog Archive