{"id":11464,"date":"2018-11-05T11:29:40","date_gmt":"2018-11-05T11:29:40","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=11464"},"modified":"2018-11-05T11:29:40","modified_gmt":"2018-11-05T11:29:40","slug":"the-surprising-slowness-of-it-departments","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/the-surprising-slowness-of-it-departments\/","title":{"rendered":"The surprising slowness of IT departments"},"content":{"rendered":"<p>Researchers have found that companies take an average of 30 days to close known vulnerabilities and that many others delay the installation of updates for several months. This is alarming given that more than 230,000 malicious programs appear every day. At the same time, researchers have also found that a major of companies (56%) could have avoided falling victim to cybercriminals if they had simply installed necessary updates on time. The slow responsiveness to closing known vulnerabilities and installing updates is the result of four main things: (1) a lack of qualified specialists, (2) ineffective business procedures, (3) difficulty in prioritizing updates and (4) the complexity of installations. As the need to close vulnerabilities and install updates is not likely to change anytime in the near future, there are a few measures organizations can take to reduce the likelihood that they will become a victim: conduct basic cyber defense courses, automate the installation of patches and invest in cybersecurity.<\/p>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-11464 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='BFC FinTech Monitor 1st \u2013 8th February'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/bfc-fintech-monitor-1st-8th-february\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2021\/02\/11172e61-d614-428a-a333-cbcfa6cd71f51-1-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-15761\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-15761'>\n\t\t\t\tBFC FinTech Monitor 1st \u2013 8th February\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='COVID-19\u2019s impact on P2P lending'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/covid-19-s-impact-on-p2p-lending\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2020\/05\/investment-3247252_1280-1-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-14933\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-14933'>\n\t\t\t\tCOVID-19\u2019s impact on P2P lending\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='How Russians pay'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/how-russians-pay\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2020\/08\/0a965054-4224-4ca3-803a-09e510ecfdc01-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-15225\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-15225'>\n\t\t\t\tHow Russians pay\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Researchers have found that companies take an average of 30 days to close known vulnerabilities and that many others delay the installation of updates for several months. This is alarming given that more than 230,000 malicious programs appear every day. At the same time, researchers have also found that a major of companies (56%) could &hellip;<\/p>\n","protected":false},"author":5,"featured_media":11508,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[184,193],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11464"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=11464"}],"version-history":[{"count":3,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11464\/revisions"}],"predecessor-version":[{"id":11509,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11464\/revisions\/11509"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/11508"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=11464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=11464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=11464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}