News

Many Microsoft Patches Are Going Uninstalled

The results of an online test conducted by U.K. anti-virus firm Sophos found that more often than not, PC users don't install Microsoft's monthly patches.

The results of an online test conducted by U.K. anti-virus firm Sophos found that more often than not, PC users don't install Microsoft's monthly patches.

The results, released on Monday, were gathered from 40 days' worth of data from a sample group of 580 PCs in corporate environments, 80 percent of which failed one or more basic security tests.

Moreover, 63 percent were found lacking at least one Microsoft patch on the OS level, the Office and application levels, or the browser and media player component levels.

Bill Emerick, Sophos' vice president of product management, said in a prepared statement, "Machines that fail such a test represent 'low-hanging fruit' for cybercriminals and [are] a real danger to their corporate networks."

But according to Randy Abrams, director of technical education for IT consultancy ESET, these reports can sometimes be like "two blind men, touching different parts of an elephant. [They] may get the same results, but it doesn't cover the whole body."

"I think we have to remember that the sample sets and control groups in tests like these need to be taken into consideration," said Abrams, himself a former Microsoft security pro. "That said, we don't need a survey to tell us that people are lax about patching their systems. I think the evidence of that is that there are far fewer zero-day or new patches than there are those that are responding to a direct set of vulnerabilities."

There are several reasons for IT pros and even individual users to delay, or altogether skip, patching their systems -- one being the fact that not every patch may apply to them.

Many enterprises also hold off patching to evaluate the cost, or to avoid either re-patching or seeing their particularly tailored systems block the patches.

There's also some lingering resistance to Automatic Updates for Microsoft patches, Abrams explained. "In these cases, the systems sometimes reboot...while you're away to automatically install the patches," he said. "I think this was a case with a good intention and bad implementation on Microsoft's part."

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • Secured-Core PCs Promise To Stop Malware at the Firmware Level

    Microsoft and its hardware partners recently described new "Secured-core" PCs, which add protections against firmware-based attacks.

  • How To Ransomware-Proof Your Backups: 4 Key Best Practices

    Backups are the only guaranteed way to save your data after a ransomware attack. Here's how to make sure your backup strategy has ransomware mitigation built right in.

  • Microsoft Buys Mover To Aid Microsoft 365 Shifts

    Microsoft announced on Monday that it bought Mover to help organizations migrate data and shift to using Microsoft 365 services.

  • Microsoft Explains Windows 7 Extended Security Updates Setup Process

    Microsoft this week described installation instructions for volume licensing users of Windows 7 Service Pack 1 to get Extended Security Updates (ESU) activated on PCs.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.