In April, Microsoft released a Windows update that wreaked havoc for anyone with antivirus (AV) software from several developers, including Avast, Avira, ArcaBit, McAfee and Sophos. The Microsoft update reported that some users might experience “slow or unresponsive” machines after the reboot. One AV software vendor even noted that after the update, login times might be prolonged, and in some cases users may be prevented from logging in altogether.

While this may be nothing more than a nuisance from a technical standpoint, from the big-picture perspective, it doesn’t help the perception of most enterprise users that security software only gets in the way of getting things done. Ultimately, if incidents like this persist — and they likely will — our level of threat protection may plummet.

When I read this story, several questions came to mind: What can be done to ensure this doesn’t happen again? How should IT departments react? With whom does the responsibility lie? Is this even a cause for concern?

Complexity Is the Enemy of Security

I reached out to Josh Mayfield, director of security strategy for Absolute, to help answer these questions and provide insight into why this issue is symbolic of a larger-scale problem for the cybersecurity industry. He told me that what kept running through his mind was the notion that complexity is the enemy of security.

“This will happen again because the system has become overly complex,” he said. “There are so many different dependencies, so many intervening links, and many don’t play by the same rulebook.”

When AV software programs are designed independently, it is only natural that there is competition for resources in the zero-sum field in which they are playing. “What’s so critical is that the operating system update will trump all of them,” Mayfield said. “If the update is problematic, there’s no way Microsoft can account for everything out there. When the update comes out, everyone is going to do it. It’s a very complex tangle, and it only exacerbates the problem. Complexity is driving that failure.”

Play (and Test) in the Sandbox

While many cybersecurity threats are preventable, this specific conundrum can complicate matters for IT teams, who will have to install the update. The best way forward could be to deploy sandboxing.

“It doesn’t have to be extraneous; even using 1-5 percent proportion of all your other resources,” Mayfield suggests. “I would encourage people to not only sandbox things and create an environment that mirrors your real environment, but let it run a little bit. There could be initial dormant processes that only awaken after the device is used in a real-world context and representative of your device population.”

Unfortunately, for many organizations the sandboxing process doesn’t last long enough to identify all of the downstream effects of specific resources accurately. And since systems are likely to be compromised on this scale in the future, it appears that we may only see positive change if all players in the cybersecurity industry take more responsibility. However, most industry analysts will agree that, at least in this particular circumstance, Microsoft has ownership of the problem.

Finding a Long-Term Solution for IT Complexity

Where does the responsibility to safeguard the industry lie? For Mayfield, the principle of buyer beware has a key role to play.

“Make sure you’re not going to do something that will harm your IT environment,” he said. “But on the industry side, who is going to own this?”

A lot of culpability falls to the general community of AV software vendors for their myopic thinking. And with so many vulnerabilities out there to patch, this story may only serve as yet another example of IT complexity wreaking havoc until the industry takes action.

“Who is responsible is usually the last one to touch it, and in some cases, it’s the AV agents,” Mayfield said. “We keep adding and adding, and then we wonder why we are in the Gordian knot. But it’s a knot we tied ourselves. The security industry can benefit from an industry that is less self-centered, so things don’t break as often.”

One long-term solution could be increased regulation for cybersecurity products. This will likely introduce some of its own complexities, but in the long run, the safeguards could spare more serious concerns down the road. “We already have regulations for encryption, so why can’t we do this for other protective tools that define the minimum requirements for cyber products?” Mayfield asks.

It’s a great question — and perhaps new regulations could provide some key answers for the whole industry around cybersecurity.

More from Application Security

Does Follina Mean It’s Time to Abandon Microsoft Office?

As a freelance writer, I spend most of my day working in Microsoft Word. Then, I send drafts to clients and companies across the globe. So, news of the newly discovered Microsoft Office vulnerability made me concerned about the possibility of accidentally spreading malware to my clients. I take extra precautions to ensure that I’m not introducing risk to my clients. Still, using Microsoft Office was something I did many times a day without a second thought. I brought up…

3 Reasons Why Technology Integration Matters

As John Donne once wrote, “No man is an island entire of itself.” With digitalization bridging any distance, the same logic could be applied to tech. Threat actors have vast underground forums for sharing their intelligence, while security professionals remain tight-lipped in a lot of data breach cases. Much like the way a vaccine can help stop the spread of infectious diseases, sharing threat intelligence and defense strategies can help to establish a more secure future for everyone.  So what…

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on investment (ROI) that can be achieved after successfully rolling out an identity strategy. They all talk about reduction in friction, improving users' perception of the…

Controlling the Source: Abusing Source Code Management Systems

For full details on this research, see the X-Force Red whitepaper “Controlling the Source: Abusing Source Code Management Systems”. This material is also being presented at Black Hat USA 2022. Source Code Management (SCM) systems play a vital role within organizations and have been an afterthought in terms of defenses compared to other critical enterprise systems such as Active Directory. SCM systems are used in the majority of organizations to manage source code and integrate with other systems within the…