fbpx
Mytek Logo
MyTek Logo

Microsoft Does Some Patching Off Schedule for IT Security

by | Oct 21, 2019 | MyTek Blog, Security

Q

Subscribe To The Blog

By subscribing to the blog, you will be notified when a new blog post is created on the site.

To keep your business’ network free from threats, and to keep your software working effectively, patching the software it uses is extremely important. The reason is that the threat landscape is always evolving. Recently, Microsoft announced that they have released an emergency out-of-band security update to fix two security issues, an atypical act for the software giant. In today’s blog, Phoenix IT services company MyTek shares more about this important IT security update. 

Typically, Microsoft releases patches on “patch Tuesday”, or every second Tuesday of the month, but because of the threats these vulnerabilities created, they went ahead and patched them. Let’s take a look at the two patches they released in their rare out-of-band patch for IT security. 

Internet Explorer Zero-Day

The major vulnerability that was patched was a zero-day vulnerability found in their antiquated Internet Browser, Internet Explorer. Being a zero-day vulnerability, it had already been exploited in the world, explaining the need for the unscheduled bug fix. 

Not much is known about the vulnerability, but Microsoft has suggested it was a remote code execution exploit that, if taken advantage of, could give an attacker complete control over the account of another user. The exploit requires that the hacked party click on a link in a phishing email while using Internet Explorer. 

Fortunately, IE is only used by under two percent of users, but attacks have already happened so remaining vigilant about any use of IE is important. Stay away from IE and you won’t have to worry about security problems coming from the old browser. 

Microsoft Defender DOS Bug

The second patched issue in the out-of-band patch was a denial of service exploit in Microsoft Defender, the antivirus shipped with Windows 10. The bug doesn’t seem to be overly troubling, as a hacker would need unfettered access to a computer and the ability to execute code. The code would disable Windows Defender’s components enough to give hackers access, and the ability to take over the system with malware or ransomware. 

Keeping your software patched and running smoothly is extremely important for your business technology’s IT security. Reach out to our expert IT technicians today to see how MyTek, a Phoenix IT services company, can help you manage your system updates and software management at 623-312-2440.

ABOUT THE AUTHOR

Tim - Team

Tim Tiller, LMSW

 
Tim Tiller, MSW brings a deep service background to his role at Mytek, having graduated from McDonald’s management training program, fresh out of high school, and working his way up through the ranks in the hospitality industry. He has led two prior companies – Multi-Systems Inc., an IT-focused organization providing technology to hospitality companies (where he was named President at age 36), and most recently, as Chief Operating Officer for Jewish Voice Ministries International.

Q

Subscribe To This Author

By subscribing to the author, you will be notified when a new blog post is created by the author.

AUTHOR’S RECENT POSTS

Top 5 Hardware Monitoring Software 

Did you know that almost 40% of servers had at least one outage in the last twelve months? Veeam reports that the most common reason for outrages is infrastructure failure which puts the current hardware monitoring practices under the scanner. Hardware failures are...

Types of Mobile Malware & How to Defend Against Them

Malware has a long history of undermining computer security and stealing critical data. With the rapid growth of mobile usage, we're now seeing a new breed of mobile malware infecting smartphones and tablets. The new-age mobile malware are more advanced, seamless, and...

How to Protect Your Data Privacy & Enhance IT Security

Every time you use a device, you enter, modify or access data. Some of your usages are routine and public but sometimes you perform tasks that are confidential in your personal life or business. Naturally, this type of data is private and it should be kept that way....

Mobile? Grab this Article!

QR Code

Blog Archive

Generated by Feedzy
Share This