{"id":1866,"date":"2006-04-18T00:00:00","date_gmt":"2006-04-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/18\/it-takes-too-long-to-patch\/"},"modified":"2021-12-30T11:40:11","modified_gmt":"2021-12-30T11:40:11","slug":"it-takes-too-long-to-patch","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/18\/it-takes-too-long-to-patch\/","title":{"rendered":"It takes too long to patch"},"content":{"rendered":"<p>The last few months have seen a number of companies being criticised for taking too long to release patches for critical vulnerabilities.  At the same time, response speed is becoming quicker, reducing the window of opportunity available to attackers.  The study shows that 19% of companies take more than a week to patch vulnerabilities, while 27% take at least two days.  Overall, nearly half of those questioned claimed their computer systems were never completely protected.  Another recent survey of consumer security showed that although 83% of users currently have an anti-virus product installed, 56% had not updated this software in the week before the survey was carried out.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malicious users are also adapting and are exploiting security flaws quicker than ever before, paving the way to the appearance of so-called &#8220;zero-day&#8221; exploits: these appear virtually at the same time that the vulnerability is disclosed.<\/p>\n<p>http:\/\/www.viruslist.com\/en\/news?id=184476427<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1866","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1866"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1866\/revisions"}],"predecessor-version":[{"id":4353,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1866\/revisions\/4353"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}