September 29, 2021 By David Bisson 2 min read

Businesses and agencies today are spending an average of about 250 days to remediate high-severity risks, NTT Application Security found.

This length of time gives attackers nearly a year in the target network. From there, they can misuse security weaknesses for gaining a foothold and/or moving within the network to other assets.

Read on to understand what factors make it take so long to remediate problems.

Nearly a Year at a Time to Remediate

Researchers found that the average time needed to fix vulnerabilities grew from 197 days to 202 days over the first half of 2021, said the report.

The window was even greater for high-severity vulnerabilities. It took 194 days at the beginning of the year to fix those types of flaws. By the end of June, it took 246 days.

These lengths of time could explain the decrease in remediation rates observed by the study. For critical vulnerabilities, the standard dropped from 54% in January 2021 to 48% six months later. The rate for high-severity vulnerabilities fell even more in H1 2021 from 50% to 38%.

Where Network Security Comes In

The findings discussed above in part reflect how the shift to remote work increased network complexity for many groups.

In a 2021 study covered by Axonius, for instance, most (55%) of respondents cited remote work as a driver of increased complexity. That’s up from 27% a year earlier.

Remote work introduced new device connections onto the corporate network and physically separated IT and security teams from device owners. Together, those two changes made it more difficult for team members to discover, manage and interact with assets. That, in turn, makes it harder to remediate known problems on a timely basis.

It’s unclear how long businesses and agencies will need to account for those challenges. To illustrate, Gartner wrote in 2020 that 82% of company leaders planned on allowing their employees to work remotely at least some of the time going forward. This will require IT and security teams to adjust their vulnerability remediation efforts.

How to Remediate Vulnerabilities More Effectively

Organizations can work to close the vulnerability remediation gaps detailed above by focusing on security basics. First, they need to confirm that they can build a dynamic inventory of their hardware and software assets. Such a list enables teams to monitor their authorized assets for known vulnerabilities.

Second, they need to track for weaknesses in the context of a risk-based vulnerability management program. It’s not enough to know a vulnerability exists. They need to understand the risk it poses to the business. That way, they can prioritize and remediate or mitigate it.

Not all organizations have the right experience to build an asset inventory and a risk-based vulnerability management program across their entire IT infrastructure. If that’s the case, they can consider using a vulnerability assessment solution that conducts thousands of vulnerability assessment tests across their hybrid and multi-cloud environments. This prescribes ways through which they can fix any issues it may discover, reducing the time to spend dealing with attacks.

More from News

Debate rages over DMCA Section 1201 exemption for generative AI

2 min read - The Digital Millennium Copyright Act (DMCA) is a federal law that protects copyright holders from online theft. The DMCA covers music, movies, text and anything else under copyright.The DMCA also makes it illegal to hack technologies that copyright owners use to protect their works against infringement. These technologies can include encryption, password protection or other measures. These provisions are commonly referred to as the “Anti-Circumvention” provisions or “Section 1201”.Now, a fierce debate is brewing over whether to allow independent hackers…

CISA Malware Next-Gen Analysis now available to public sector

2 min read - One of the main goals of the Cybersecurity and Infrastructure Security Agency (CISA) is to promote security collaboration across the public and private sectors. CISA firmly believes that partnerships and effective coordination are essential to maintaining critical infrastructure security and cyber resilience.In faithfulness to this mission, CISA is now offering the Malware Next-Generation Analysis program to businesses and other organizations. This service has been available to government and military workers since November 2023 but is now available to the private…

Change Healthcare attack expected to exceed $1 billion in costs

3 min read - The impact of the recent Change Healthcare cyberattack is unprecedented — and so are the costs. Rick Pollack, President and CEO of the American Hospital Association, stated, “The Change Healthcare cyberattack is the most significant and consequential incident of its kind against the U.S. healthcare system in history.”In a recent earnings call, UnitedHealth Group, the parent company of Change Healthcare, speculated on the overall data breach costs. When all is said and done, the total tally may reach $1 billion…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today