ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

U.S. Government Taking Steps Toward Protecting Data

U.S. Government Taking Steps Toward Protecting Data

Do you remember the series of high-profile infrastructure attacks that occurred not so long ago this year? Well, now the United States government is taking matters into its own hands by ordering the patching of various vulnerabilities in affected systems. It’s a massive effort to thwart hackers and other cyberthreats from taking root in vulnerable systems.

This directive was issued by the Cybersecurity and Infrastructure Security Agency (CISA), and it has due dates ranging from November of 2021 all the way to May of 2022. CISA is pushing for all federal agencies and organizations to resolve a certain series of known, exploited vulnerabilities during this timeframe, with some notable exceptions for national security-related infrastructures.

This catalog of known, exploited vulnerabilities can be found on CISA’s website. The catalog includes all sorts of information on each known vulnerability, and all of them (around 300 or so) are believed to pose some sort of risk to the federal government. This catalog also contains links to the NIST database for guidance on how to apply patches and resolve these vulnerabilities.

This is a massive undertaking and one that will inevitably lead to some confusion as patches are deployed and administered—especially since each of the departments are responsible for deploying their own updates and are only accountable to CISA. That said, CISA is putting some pressure on these organizations to meet specific objectives and requirements within a set amount of time.

The timeline for deploying these patches and updates varies, but within 60 days, agencies must review and update their policies on vulnerability management. These policies and procedures must then be furnished upon request. Agencies must also have a policy in place for deploying the directive from CISA, a process that is incredibly involved. Organizations will have to identify who is responsible for what, as well as how they plan to track and report on the implementation process.

Patch management can be difficult for governments, but it’s even more challenging for small businesses that don’t have the seemingly limitless spending power and other resources afforded to larger organizations and enterprises. Instead of resolving issues that need to be resolved, SMBs tend to get around to patching things as they have the time and manpower to do so. This is not the correct approach, as every day you wait to patch vulnerabilities on your system is another day that a hacker could exploit them.

ClearView IT can make the patch implementation process easy. We can automatically or remotely deploy patches and security updates to your organization’s hardware and software solutions without an on-site visit. This makes our services so easy and convenient that you’ll never consider ignoring a patch or security warning again.

To learn more about our security services, reach out to ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Mobile Devices Network Managed IT Services Communication Data Recovery Productivity Quick Tips Social Media VoIP Users Mobile Device Tech Term Automation Business Continuity Windows 10 Facebook Disaster Recovery Passwords Holiday Covid-19 IT Support Apps Windows 10 Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Gadgets Spam Server Blockchain Bandwidth WiFi Encryption Mobile Device Management Information Remote Business Technology App Virtualization History Office 365 Budget Gmail Office Employee/Employer Relationship Apple Two-factor Authentication Information Technology Health Access Control Data Security Analytics Cybercrime Wi-Fi Conferencing BDR Big Data Employer-Employee Relationship Document Management Voice over Internet Protocol Hacker Save Money Patch Management Remote Computing Compliance Remote Monitoring Help Desk Hacking Cost Management IT Management Vendor Training Legal Retail Alert Data storage Mobile Office Money Hiring/Firing Customer Service Unified Threat Management Managed Services Outlook Firewall Password Data loss Augmented Reality Word Project Management BYOD IBM Website Computing Vendor Management Hard Drive Applications Search... Best Practice Vulnerabilities Printer Monitoring VPN Healthcare Update Remote Workers Windows 7 Free Resource Sports Travel User Social DDoS Virtual Reality SaaS Social Engineering Cryptocurrency Paperless Office Antivirus Black Market How To iPhone Cleaning Maintenance Cortana Chrome Education Robot Content Filtering Websites Router Mobile Computing Meetings Data Breach Mobility Marketing The Internet of Things YouTube Twitter Google Maps Running Cable Scam Windows 11 Law Enforcement Storage Laptop End of Support Multi-factor Authentication Professional Services Downtime Tech Terms Hack Safety Identity Theft Notifications Managed IT Saving Time Digital Unified Communications Managed Services Provider Virtual Desktop Computers HIPAA Bitcoin Experience Google Docs Virtual Private Network Bluetooth Taxes Telephone Distributed Denial of Service Office Tips Current Events Private Cloud Memory Excel Solutions Disaster Physical Security Integration Politics Images 101 Lithium-ion battery Display Machine Learning Settings PowerPoint Virtual Assistant Start Menu Computer Care Administration Solid State Drive Downloads Processors Employees Presentation Avoiding Downtime Vulnerability Specifications Chromebook Software as a Service Drones IT Consultant Holidays Data Protection Processor Automobile Cooperation Customer Relationship Management Video Conferencing Co-Managed IT Entertainment How To Wireless Technology Microchip Virtual Machines Computer Repair Flexibility eWaste intranet Employer Employee Relationship PCI DSS Licensing In Internet of Things Television Telephony Fake News Supply Chain Wireless Hacks Shortcut Network Congestion Cabling Proxy Server Gig Economy Emails Humor Service Level Agreement Internet Service Provider Computing Infrastructure Azure Reliable Computing Heating/Cooling Writing Tablet Environment G Suite Business Communications Social Networking Tracking Management Regulations Compliance Device security Managed IT Service Windows XP Mouse VoIP Microsoft Excel Workplace Wireless Headphones Memes Tech Human Resources Going Green Net Neutrality Troubleshooting Business Cards Scalability Web Server Proactive IT Digital Payment Error Financial Data Administrator SharePoint Text Messaging IT Scams Bring Your Own Device Worker Bookmark Risk Management Term Google Apps Download Piracy Access Time Management Music Public Cloud Telework HTML Nanotechnology Communitications Microsoft 365 Cables Staffing Browsers Smartwatch Google Play Upload Procurement Business Owner Software License Audit IP Address Spyware File Sharing Social Network FinTech Botnet Screen Reader IT Assessment Point of Sale Rental Service Redundancy Micrsooft Data Analysis CES Security Cameras Trends Supply Chain Management Mobile Technology Value Flash Cache Shortcuts Telephone Systems Unified Threat Management Business Growth Workers Customer Resource management Organization Devices Cyber security Smart Devices Tip of the week Recovery Competition Fileless Malware CCTV Gamification Remote Working Inbound Marketing Company Culture Printing Be Proactive Banking Touchscreen Entrepreneur Google Wallet Telephone System AI Regulations Trend Micro LiFi Backup and Disaster Recovery Electronic Health Records Transportation Documents Messenger Emergency Application Deep Learning Computer Malfunction Directions Digital Security Cameras Business Intelligence Content Desktop Wasting Time Vendor Mangement Modem Workplace Strategies Business Metrics Hosted Solution Samsung Electronic Medical Records Electronic Payment Accountants eCommerce Database Surveillance Securty Books Uninterrupted Power Supply Webcam Videos Society Managing Costs Domains Language Business Mangement SSID Tablets Health IT Equifax Phone System Tactics Development Hard Drive Disposal Employer/Employee Relationships Reading Monitors Visible Light Communication Media Windows 8 Supercomputer Username Virtual Machine Google Calendar Freedom of Information Smart Technology Virus Reviews Startup Optimization Addiction email scam Teamwork Relocation Public Speaking Displays Advertising Motion Sickness Navigation 2FA Tech Support Data Storage Mobile Security Hypervisor Streaming Media Comparison Computer Accessories Work/Life Balance Google Drive News Medical IT Keyboard User Tip Shopping Legislation Network Management SQL Server Knowledge Hard Drives Corporate Profile Evernote Paperless

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?