{"id":5173,"date":"2020-02-27T12:25:05","date_gmt":"2020-02-27T17:25:05","guid":{"rendered":"https:\/\/www.thinknts.com\/?p=5173"},"modified":"2020-02-27T12:25:05","modified_gmt":"2020-02-27T17:25:05","slug":"patching","status":"publish","type":"post","link":"https:\/\/keyweb1.com\/nts\/patching\/","title":{"rendered":"6 Defense-In-Depth Security Tactics as Recommended by the National Cyber Security Centre"},"content":{"rendered":"<p>The National Cyber Security Centre (NCSC)\u00a0stated\u00a0in a blog, &#8220;<em>patching remains the\u00a0single most important thing you can do to secure your technology and is\u00a0why applying patches is often described as &#8216;doing the basics.\u201d<\/em><\/p>\n<p>They go on to explain that it\u2019s not easy to do in practice. This is due to factors such as the time it takes, the cost, maintenance of accurate asset inventories, the risk of a patch breaking something, failed rollouts, or the inability to patch all equipment. When patching is hard, the NCSC recommends six defense-in-depth tactics to help prevent attacks, detect and respond:<\/p>\n<ol>\n<li>Reduce ways to exploit attacks through architecture and configuration.<\/li>\n<li>Manage your assets well (know what you have and what it&#8217;s doing, and have ways of finding out when something changes)<\/li>\n<li>Manage your operational risks<\/li>\n<li>Back up your business-critical data<\/li>\n<li>Have a security monitoring capability, to help with problem detection and cleanup<\/li>\n<li>Create and practice incident response\/business continuity plans<\/li>\n<\/ol>\n<p>Contact NTS if you need help with any, or all, of the above.<\/p>\n<p><em>We do IT very well, every day!<\/em><\/p>\n<p>Mark Brandon\u00a0\u00a0 <a href=\"mailto:mbrandon@thinkNTS.com\">mbrandon@thinkNTS.com<\/a><\/p>\n<p>Original article found here: <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/the-problems-with-patching\">https:\/\/www.ncsc.gov.uk\/blog-post\/the-problems-with-patching<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The National Cyber Security Centre (NCSC)\u00a0stated\u00a0in a blog, &#8220;patching remains the\u00a0single most important thing you can do to secure your technology and is\u00a0why applying patches is often described as &#8216;doing the basics.\u201d They go on to explain that it\u2019s not &hellip; <a href=\"https:\/\/keyweb1.com\/nts\/patching\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-5173","post","type-post","status-publish","format-standard","hentry","category-newsroom"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/posts\/5173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/comments?post=5173"}],"version-history":[{"count":2,"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/posts\/5173\/revisions"}],"predecessor-version":[{"id":5175,"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/posts\/5173\/revisions\/5175"}],"wp:attachment":[{"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/media?parent=5173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/categories?post=5173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/keyweb1.com\/nts\/wp-json\/wp\/v2\/tags?post=5173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}