September 29, 2021 By David Bisson 2 min read

Businesses and agencies today are spending an average of about 250 days to remediate high-severity risks, NTT Application Security found.

This length of time gives attackers nearly a year in the target network. From there, they can misuse security weaknesses for gaining a foothold and/or moving within the network to other assets.

Read on to understand what factors make it take so long to remediate problems.

Nearly a Year at a Time to Remediate

Researchers found that the average time needed to fix vulnerabilities grew from 197 days to 202 days over the first half of 2021, said the report.

The window was even greater for high-severity vulnerabilities. It took 194 days at the beginning of the year to fix those types of flaws. By the end of June, it took 246 days.

These lengths of time could explain the decrease in remediation rates observed by the study. For critical vulnerabilities, the standard dropped from 54% in January 2021 to 48% six months later. The rate for high-severity vulnerabilities fell even more in H1 2021 from 50% to 38%.

Where Network Security Comes In

The findings discussed above in part reflect how the shift to remote work increased network complexity for many groups.

In a 2021 study covered by Axonius, for instance, most (55%) of respondents cited remote work as a driver of increased complexity. That’s up from 27% a year earlier.

Remote work introduced new device connections onto the corporate network and physically separated IT and security teams from device owners. Together, those two changes made it more difficult for team members to discover, manage and interact with assets. That, in turn, makes it harder to remediate known problems on a timely basis.

It’s unclear how long businesses and agencies will need to account for those challenges. To illustrate, Gartner wrote in 2020 that 82% of company leaders planned on allowing their employees to work remotely at least some of the time going forward. This will require IT and security teams to adjust their vulnerability remediation efforts.

How to Remediate Vulnerabilities More Effectively

Organizations can work to close the vulnerability remediation gaps detailed above by focusing on security basics. First, they need to confirm that they can build a dynamic inventory of their hardware and software assets. Such a list enables teams to monitor their authorized assets for known vulnerabilities.

Second, they need to track for weaknesses in the context of a risk-based vulnerability management program. It’s not enough to know a vulnerability exists. They need to understand the risk it poses to the business. That way, they can prioritize and remediate or mitigate it.

Not all organizations have the right experience to build an asset inventory and a risk-based vulnerability management program across their entire IT infrastructure. If that’s the case, they can consider using a vulnerability assessment solution that conducts thousands of vulnerability assessment tests across their hybrid and multi-cloud environments. This prescribes ways through which they can fix any issues it may discover, reducing the time to spend dealing with attacks.

More from News

White House cements CISA’s role as national coordinator for cybersecurity

2 min read - In 2013, the Obama Administration rolled out "The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience", a forerunner to the Cybersecurity and Infrastructure Security Agency (CISA), created "to strengthen and maintain secure, functioning and resilient critical infrastructure."The directive was groundbreaking in 2013, noting the importance of the rising risk of cyberattacks against critical infrastructure. But as cyber risks are constantly shifting, every cybersecurity program needs to be re-evaluated, and CISA is no exception. That’s why, in April 2024, President…

Debate rages over DMCA Section 1201 exemption for generative AI

3 min read - The Digital Millennium Copyright Act (DMCA) is a federal law that protects copyright holders from online theft. The DMCA covers music, movies, text and anything else under copyright. The DMCA also makes it illegal to hack technologies that copyright owners use to protect their works against infringement. These technologies can include encryption, password protection or other measures. These provisions are commonly referred to as the “Anti-Circumvention” provisions or “Section 1201”. Now, a fierce debate is brewing over whether to allow…

CISA Malware Next-Gen Analysis now available to public sector

2 min read - One of the main goals of the Cybersecurity and Infrastructure Security Agency (CISA) is to promote security collaboration across the public and private sectors. CISA firmly believes that partnerships and effective coordination are essential to maintaining critical infrastructure security and cyber resilience. In faithfulness to this mission, CISA is now offering the Malware Next-Generation Analysis program to businesses and other organizations. This service has been available to government and military workers since November 2023 but is now available to the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today