DIG this week's security tip

Updated: May 4

The Cybersecurity & Infrastructure Security Agency (CISA) recently added nine known exploited vulnerabilities to its catalog. But what exactly does that mean in terms of your IT infrastructure and how can you be protected from vulnerabilities?


Vulnerabilities are flaws in a computer system that weaken the overall security of your device or system. They can be weaknesses in the hardware (desktop or server) itself, or the software. Cybercriminals use their knowledge of these flaws to cause harm to or gain access to your systems.


As you can see from the CISA alert above, vulnerabilities are always being identified. There is a type of vulnerability called a zero-day which is so far unseen, or it is unknown how to protect against it. The best way to protect your personal devices against vulnerabilities is to install system and software updates as soon as you

are prompted by your device. To better protect your organization, ensure there is a vulnerability identification and patch management process to keep your devices and systems up to date and patched.


If you have questions about better securing your organization or would like assistance with vulnerability management, please contact the DIG.

1 view

Recent Posts

See All