What's a bit surprising is that even though the half life of vulnerabilities -- or time it takes to resolve vulnerabilities on 50 percent of desktops -- is about 30 days, there is still a persistence of critical vulnerabilities that last over a long period of time. For example, major vulnerabilities stick around at a level of about 5 percent to 10 percent instead of being extinguished completely. The report even says they still see the existence of vulnerabilities associated with the SQL Slammer worm back in 2003.
Those are scary numbers. As a consumer, it's disconcerting to see the graphs on page 5 that show the persistence of vulnerabilities in the different markets. I'd prefer to see much lower numbers in financial and health markets than 20 percent of desktops being affected by critical vulnerabilities at days 90 and 60, respectively.
As a security professional and customer of companies in those industries, I'd be seriously ticked if my information was disclosed by one of them because of a client side exploit. Isn't one of the major reasons for these organizations being scanned by a company like Qualys to find vulns and fix them? What gives?
Or is this a case of the security professionals in those companies not being taken seriously? Or maybe their not doing a good job making the case for quick and effective patch management? What do you think?
John H. Sawyer is a senior security engineer on the IT Security Team at the University of Florida. The views and opinions expressed in this blog are his own and do not represent the views and opinions of the UF IT Security Team or the University of Florida. When John's not fighting flaming, malware-infested machines or performing autopsies on blitzed boxes, he can usually be found hanging with his family, bouncing a baby on one knee and balancing a laptop on the other. Special to Dark Reading.