ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

U.S. Government Taking Steps Toward Protecting Data

U.S. Government Taking Steps Toward Protecting Data

Do you remember the series of high-profile infrastructure attacks that occurred not so long ago this year? Well, now the United States government is taking matters into its own hands by ordering the patching of various vulnerabilities in affected systems. It’s a massive effort to thwart hackers and other cyberthreats from taking root in vulnerable systems.

This directive was issued by the Cybersecurity and Infrastructure Security Agency (CISA), and it has due dates ranging from November of 2021 all the way to May of 2022. CISA is pushing for all federal agencies and organizations to resolve a certain series of known, exploited vulnerabilities during this timeframe, with some notable exceptions for national security-related infrastructures.

This catalog of known, exploited vulnerabilities can be found on CISA’s website. The catalog includes all sorts of information on each known vulnerability, and all of them (around 300 or so) are believed to pose some sort of risk to the federal government. This catalog also contains links to the NIST database for guidance on how to apply patches and resolve these vulnerabilities.

This is a massive undertaking and one that will inevitably lead to some confusion as patches are deployed and administered—especially since each of the departments are responsible for deploying their own updates and are only accountable to CISA. That said, CISA is putting some pressure on these organizations to meet specific objectives and requirements within a set amount of time.

The timeline for deploying these patches and updates varies, but within 60 days, agencies must review and update their policies on vulnerability management. These policies and procedures must then be furnished upon request. Agencies must also have a policy in place for deploying the directive from CISA, a process that is incredibly involved. Organizations will have to identify who is responsible for what, as well as how they plan to track and report on the implementation process.

Patch management can be difficult for governments, but it’s even more challenging for small businesses that don’t have the seemingly limitless spending power and other resources afforded to larger organizations and enterprises. Instead of resolving issues that need to be resolved, SMBs tend to get around to patching things as they have the time and manpower to do so. This is not the correct approach, as every day you wait to patch vulnerabilities on your system is another day that a hacker could exploit them.

ClearView IT can make the patch implementation process easy. We can automatically or remotely deploy patches and security updates to your organization’s hardware and software solutions without an on-site visit. This makes our services so easy and convenient that you’ll never consider ignoring a patch or security warning again.

To learn more about our security services, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Small Business Smartphones Microsoft Office Network Mobile Devices Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Windows 10 Browser Apps Managed Service Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Artificial Intelligence Managed IT services Workplace Strategy Gadgets Networking Windows App Virtualization Blockchain WiFi Spam Remote Business Technology Information Bandwidth Mobile Device Management Encryption Server Office Information Technology Two-factor Authentication Office 365 Employee/Employer Relationship Budget History Gmail Apple Analytics BDR Conferencing Wi-Fi Cybercrime Health Access Control Data Security Big Data Patch Management Help Desk Hacking Remote Computing Document Management Remote Monitoring Save Money Hacker IT Management Training Compliance Vendor Employer-Employee Relationship Voice over Internet Protocol Cost Management Hiring/Firing Outlook Legal Password Project Management Data storage Data loss Money Customer Service Unified Threat Management Firewall Search... BYOD Best Practice Augmented Reality Applications Word Computing Mobile Office Retail Vendor Management IBM Vulnerabilities Hard Drive Alert Website Managed Services User How To The Internet of Things Paperless Office YouTube Law Enforcement Antivirus End of Support Maintenance Printer Laptop Chrome Websites Travel Virtual Reality Mobility Meetings Mobile Computing Social Engineering Cryptocurrency Windows 11 Sports Black Market Social Google Maps Marketing SaaS DDoS Scam Cleaning Running Cable Data Breach Robot iPhone Storage Education VPN Cortana Remote Workers Content Filtering Update Windows 7 Free Resource Monitoring Router Healthcare Twitter Saving Time How To Solutions Microchip Computers Bitcoin Flexibility Images 101 Physical Security Integration Display Telephone Wireless Technology Identity Theft eWaste Hack Notifications Unified Communications Start Menu Employees Excel Downloads Downtime Computer Care Avoiding Downtime PowerPoint Google Docs Safety Vulnerability Administration Holidays Bluetooth Distributed Denial of Service Presentation Virtual Desktop Office Tips Software as a Service Experience Data Protection Specifications Virtual Assistant Private Cloud Cooperation Memory IT Consultant Video Conferencing Virtual Machines Customer Relationship Management Computer Repair Co-Managed IT Politics Settings Processor Disaster Entertainment Machine Learning Professional Services Tech Terms Solid State Drive Lithium-ion battery Managed Services Provider Managed IT Digital Chromebook Drones Multi-factor Authentication Virtual Private Network Processors Taxes Automobile Current Events HIPAA Advertising Wireless Headphones FinTech Microsoft Excel Relocation Displays Work/Life Balance Shortcuts Tech Audit Tech Support Going Green Spyware CES Business Cards IT Assessment Value Error File Sharing Supply Chain Management Business Owner Organization Cyber security Bookmark Redundancy Be Proactive Term Download Cache Public Speaking Piracy Smart Devices In Internet of Things Hacks Streaming Media Network Congestion Unified Threat Management HTML Workers Remote Working Nanotechnology Keyboard AI Trend Micro Reliable Computing Writing Browsers Workplace Strategies Google Play Printing Upload Hard Drives Digital Security Cameras Software License CCTV Electronic Health Records Transportation Wasting Time Social Network Touchscreen intranet Wireless Screen Reader Inbound Marketing Shortcut Computer Malfunction eCommerce Scalability Modem Data Analysis Emergency Text Messaging Security Cameras Proactive IT Trends Vendor Mangement Heating/Cooling Videos Mobile Technology Environment Surveillance Administrator Social Networking Managing Costs Bring Your Own Device Windows XP Customer Resource management Devices Samsung Uninterrupted Power Supply Tip of the week Webcam SSID Fileless Malware Employer/Employee Relationships Smart Technology Music Gamification Business Mangement Electronic Payment Media Company Culture Development Tablets Virtual Machine Telephone System Regulations Backup and Disaster Recovery Reviews Optimization Directions Teamwork Google Calendar Content 2FA Desktop Supercomputer Phone System Botnet Data Storage Hypervisor Rental Service Micrsooft Electronic Medical Records Virus Accountants Staffing Database Shopping Motion Sickness Medical IT Flash SQL Server Telephone Systems Supply Chain Comparison Business Growth Google Drive IP Address Paperless PCI DSS Licensing Health IT Equifax Knowledge Tactics Corporate Profile Gig Economy Hard Drive Disposal Computer Accessories Humor Azure Banking Workplace Television Google Wallet Username Telephony Business Communications Employer Employee Relationship Internet Service Provider Startup Cabling Regulations Compliance Freedom of Information Managed IT Service Messenger Deep Learning Navigation Recovery Addiction Tablet Competition email scam G Suite Memes Business Metrics Scams Mouse Hosted Solution VoIP Human Resources Mobile Security Tracking Net Neutrality Legislation Entrepreneur Financial Data News Books LiFi User Tip Language Evernote Documents Society Network Management Application Risk Management Web Server IT Cables SharePoint Google Apps Digital Payment Business Intelligence Visible Light Communication Emails Worker Troubleshooting Telework Fake News Reading Monitors Proxy Server Securty Windows 8 Service Level Agreement Access Smartwatch Computing Infrastructure Communitications Microsoft 365 Point of Sale Management Time Management Domains Device security Public Cloud Procurement

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?