{"id":16925,"date":"2018-10-25T13:00:54","date_gmt":"2018-10-25T13:00:54","guid":{"rendered":"https:\/\/blog.trendmicro.com\/?p=542183"},"modified":"2018-10-25T13:00:54","modified_gmt":"2018-10-25T13:00:54","slug":"the-patching-problem-best-practices-for-maintaining-up-to-date-systems","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/","title":{"rendered":"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"289\" height=\"300\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog3-289x300.jpg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"\"\/><\/p>\n<p>\u201cUpdate ready to be installed.\u201d<\/p>\n<p>IT teams and business stakeholders are probably\u00a0familiar with this notification, or something like it. After all, software updates are nothing new: Whenever a vendor makes improvements or includes new capabilities on a previously-released platform, it comes with a software update.<\/p>\n<p>But boosting existing features aren\u2019t the only reason that patching is important.<\/p>\n<h3><strong>Vulnerabilities and the consequences of late patching<\/strong><\/h3>\n<p>As Trend Micro noted in its \u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unseen-threats-imminent-losses\">Unseen Threats, Imminent Losses<\/a>\u201d report, there were two major vulnerabilities found at the beginning of 2018 within popular microprocessing solutions \u2013 and these were far from the only weaknesses discovered.<\/p>\n<p><em>\u201cTrend Micro published more than 600 vulnerability advisories in just the first half of 2018.\u201d<\/em><\/p>\n<p>Trend Micro alone published more than 600 vulnerability advisories in just the first half of 2018. While software is typically thought of as the focus for these advisories, as with the case of the microprocessing issues, hardware vulnerabilities requiring firmware patches became more prevalent this year as well.<\/p>\n<p>\u201cHardware vulnerabilities present a complicated problem for IT admins,\u201d Trend Micro\u2019s report stated. \u201cAlong with these hardware problems, IT admins also had to deal with vulnerabilities disclosed by major software vendors. Major vendors release regular patches as disclosed vulnerabilities are found and fixed, but enterprises still have difficulty securing their networks.\u201d<\/p>\n<p>Exploiting known weaknesses is a top strategy leveraged by hackers.\u00a0Therefore,\u00a0organizations must be sure to apply and deploy patches as quickly as possible after they are released by hardware and software vendors. This significantly reduces the chances that these known weaknesses or issues could be used against the business within an infiltration or cybersecurity attack.<\/p>\n<h3><strong>Firmware patches: Unique complications<\/strong><\/h3>\n<p>As Trend Micro pointed out, while software patches certainly come with their own challenges \u2013 including the sheer volume of updates released on a regular basis \u2013 patches that impact hardware elements can present considerable complications for an enterprise\u2019s IT team.<\/p>\n<p>\u201cApplying firmware patches\u00a0across all affected devices is much more difficult,\u201d the report stated. \u201cIn addition, some of the patches affect the system performance of older devices, compounding the impact on the business.\u201d<\/p>\n<p>While this was in relation to the microprocessing hardware vulnerabilities and associated firmware patching specifically, hardware updates of this kind can make it difficult for businesses to ensure that all weaknesses and issues within their infrastructure elements are continually addressed.<\/p>\n<p>\u201cThe pressure to keep networks operational make patching a perennial problem for administrators,\u201d the report noted.<\/p>\n<h3><strong>SCADA vulnerabilities<\/strong><\/h3>\n<p>In particular, the cybersecurity landscape saw considerable advisories tied to SCADA (supervisory control and data acquisition) platforms, used by organizations across a number of major industry sectors.<\/p>\n<p>Overall, there was a 30 percent increase in SCADA vulnerabilities seen during the first six months of 2018, compared to Q3 and Q4 of 2017. Many of these involved issues or weaknesses in human-machine interface SCADA software, which can provide key details for hackers.<\/p>\n<p>As <a href=\"http:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unseen-threats-imminent-losses\">Trend Micro researchers pointed out<\/a>, attacking a SCADA system may just be step one within the breach processes for malicious actors, as this information could be a springboard, providing reconnaissance information about the business and its processes to better inform future attacks.<\/p>\n<p>While the number of SCADA vulnerabilities increased overall, research shows that vendors are much more responsive when creating patches for these identified weaknesses. This year, Trend Micro researchers observed a 77 percent decrease in zero-day SCADA vulnerabilities, compared with the second half of 2017. This does not, however, mean that enterprise SCADA software users can be lax when it comes to the security of their platforms.<\/p>\n<p>\u201cWhile this is a welcome improvement, the sheer number of discovered vulnerabilities highlights why enterprises in critical infrastructure sectors should stay on top of SCADA software systems and invest in multilayered security solutions,\u201d the report noted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-542184\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog2.jpg\" alt=\"\" width=\"800\" height=\"534\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog2.jpg 800w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog2-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog2-768x513.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog2-640x427.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog2-440x294.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/10\/blog2-380x254.jpg 380w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\"\/><\/p>\n<p><em>Unpatched systems leave the door open for malicious actors to exploit known vulnerabilities.<\/em><\/p>\n<h3><strong>Lessons learned from WannaCry and Petya<\/strong><\/h3>\n<p>SCADA and other vulnerabilities may pale in comparison with the types of widespread vulnerabilities that IT teams have likely seen in 2018 and particularly last year. <a href=\"https:\/\/www.statista.com\/chart\/9399\/wannacry-cyber-attack-in-numbers\/\">WannaCry<\/a>, especially, affected hundreds of thousands of systems across the globe, demanding that victims pay ransom in untraceable cryptocurrency for decryption of critical files and data.<\/p>\n<p>As intelligence researchers relayed, this resulted in billion-dollar costs in \u201c<a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/patching-problems-and-how-to-solve-them\">stalled operations and lost revenue<\/a>\u201d for organizations that fell victim to WannaCry.<\/p>\n<p>After WannaCry, Petya emerged, with the similarity between these two being the fact that they leveraged the same, previously patched vulnerability: MS17-010, dubbed \u201cEternalBlue.\u201d Due to the widespread impact and associated losses, these cases, in particular,\u00a0shined a key spotlight on the issue of regular patches and patch management.<\/p>\n<p>\u201cDespite the availability of a patch that could have prevented an infection, many companies and users still had vulnerable systems,\u201d Trend Micro indicated in its research. \u201cThis situation only begs the question: can we fix the lag between patch release and application?\u201d<\/p>\n<h3><strong>How to overcome patch management struggles<\/strong><\/h3>\n<p>One 2015 study found that some organizations don\u2019t put updates in place until as many as 100 days after patches are released. Thankfully, this attitude has changed a bit in the wake of vulnerabilities like WannaCry and Petya.<\/p>\n<p>Here are four key best practices to consider implementing within enterprise patch management processes:<\/p>\n<table>\n<tbody readability=\"7.8493150684932\">\n<tr readability=\"15.698630136986\">\n<td width=\"20px\"\/>\n<td>\n<ul>\n<li><strong>Awareness and automation:<\/strong> While impacts from WannaCry and similar attacks certainly send a message, one of the first steps in improving an\u00a0updating strategy is to ensure awareness of the importance of timely patches. A 2017 study from Forbes and BMC found that businesses are becoming more dedicated to this, and are increasing their investment in automated patching solutions to help. Overall, 43 percent of executives said they\u2019re working with their IT team to make patching a more critical priority.<\/li>\n<li><strong>Avoid ad hoc patching:<\/strong> While ad hoc patching may take place in certain instances, using this as a regular strategy can become a serious issue for today\u2019s businesses. It\u2019s important that executives and IT leaders work to avoid ad hoc patching, and utilize a more holistic approach and regular schedule to ensure that updates are applied as soon as possible to affected hardware and software.<\/li>\n<li><strong>Prioritize appropriately:<\/strong> Timeliness is one of the biggest challenges of patch management \u2013 sometimes, it simply isn\u2019t feasible to apply a patch the same day (or even week) that it\u2019s released. Other IT initiatives and important projects may not leave enough time to devote to these pursuits. As TechRepublic contributor Mary Shacklett noted, certain patches, like those strictly for performance improvements and other <a href=\"https:\/\/www.techrepublic.com\/article\/8-best-practices-for-managing-software-patches\/\">non-critical bugs, can be put off<\/a>. But updates related to security vulnerabilities should always be prioritized and applied as quickly as possible.<\/li>\n<li><strong>Test patches after installation:<\/strong> Once a patch is in place, however, the IT team\u2019s work isn\u2019t completed just yet. It\u2019s imperative that IT admins test patches after they\u2019ve been installed to fully ensure that they work appropriately and that weaknesses have been addressed.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"\/>\n<td\/>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Trend Micro offers several key solutions to help with patch management, including <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/network\/advanced-threat-protection.html\">Deep Discovery<\/a>, <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/hybrid-cloud.html\">Deep Security<\/a> and <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps.html\">Vulnerability Protection<\/a>. Contact us today to learn more.<\/p>\n<p> Read More <a href=\"https:\/\/blog.trendmicro.com\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Update ready to be installed.&#8221; IT teams and business stakeholders are probably\u00a0familiar with this notification, or something like it. After all, software updates are nothing new: Whenever a vendor makes improvements or includes new capabilities on a previously-released platform, it comes with a software update. But boosting existing features aren&#8217;t the only reason that patching&#8230;<br \/>\nThe post The Patching Problem: Best Practices for Maintaining Up-to-Date Systems appeared first on . Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":16926,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[311,1415,4203,79,4204,307,4205,4206],"class_list":["post-16925","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-current-news","tag-deep-discovery","tag-deep-security","tag-firmware-update","tag-patch-management","tag-security","tag-software-patch","tag-vulnerability-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Patching Problem: Best Practices for Maintaining Up-to-Date Systems 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-25T13:00:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"289\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems\",\"datePublished\":\"2018-10-25T13:00:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/\"},\"wordCount\":1170,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg\",\"keywords\":[\"Current News\",\"Deep Discovery\",\"Deep Security\",\"firmware update\",\"patch management\",\"Security\",\"software patch\",\"Vulnerability Protection\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/\",\"name\":\"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg\",\"datePublished\":\"2018-10-25T13:00:54+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg\",\"width\":289,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Current News\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/current-news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/","og_locale":"en_US","og_type":"article","og_title":"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-10-25T13:00:54+00:00","og_image":[{"width":289,"height":300,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems","datePublished":"2018-10-25T13:00:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/"},"wordCount":1170,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg","keywords":["Current News","Deep Discovery","Deep Security","firmware update","patch management","Security","software patch","Vulnerability Protection"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/","url":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/","name":"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg","datePublished":"2018-10-25T13:00:54+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/10\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems.jpg","width":289,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/the-patching-problem-best-practices-for-maintaining-up-to-date-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Current News","item":"https:\/\/www.threatshub.org\/blog\/tag\/current-news\/"},{"@type":"ListItem","position":3,"name":"The Patching Problem: Best Practices for Maintaining Up-to-Date Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=16925"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/16925\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/16926"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=16925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=16925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=16925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}