{"id":5707,"date":"2021-09-07T21:49:19","date_gmt":"2021-09-07T21:49:19","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5707"},"modified":"2021-09-07T21:52:13","modified_gmt":"2021-09-07T21:52:13","slug":"vulnerability-management-2","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5707","title":{"rendered":"Vulnerability Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5707\" class=\"elementor elementor-5707\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-44853beb ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"44853beb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3c70fb61 ot-flex-column-vertical\" data-id=\"3c70fb61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-618789c9 elementor-section-full_width elementor-section-content-bottom ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"618789c9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2d4aaa71 ot-flex-column-vertical\" data-id=\"2d4aaa71\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-254b9826 elementor-widget elementor-widget-iheading\" data-id=\"254b9826\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ VULNERABILITY MANAGEMENT<\/span>\r\n\t        <h2 class=\"main-heading\">Continuously Monitor Your Network Health<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5c7af508 ot-flex-column-vertical\" data-id=\"5c7af508\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7541aaed elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"7541aaed\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1f75779f ot-flex-column-vertical\" data-id=\"1f75779f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-764876e5 elementor-widget elementor-widget-text-editor\" data-id=\"764876e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If your applications are delivered with vulnerabilities attached \u2013 it won\u2019t matter how good your network security is. This is true whether they\u2019re hosted on-premise or in the cloud.<\/p><p>While patching will resolve most vulnerabilities found on your network, others can have a bigger impact such as careless administration and use of IT equipment. These need to be managed as much, if not more than patches.<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-2517\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/Vuln-Shadow-288x300-1.png\" alt=\"\" width=\"320\" height=\"333\" \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9b97768 ot-flex-column-vertical\" data-id=\"9b97768\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ee744c1 elementor-widget elementor-widget-text-editor\" data-id=\"4ee744c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><h4><span style=\"color: #ffffff;\"><strong>Examples of non-patch related vulnerabilities include:<\/strong><\/span><\/h4><p style=\"padding-left: 40px;\">\u2022 A new printer is installed without changing the default password. This printer caches printed documents with the last 100 documents printed available to anyone on the network<br \/>\u2022 A web developer turns on the \u2018TRACE\u2019 method on a production website to debug a problem and forgets to turn it off. Criminals can do \u2018Cross Site Tracing\u2019 on your website, allowing them to trick your visitors into thinking they\u2019re seeing your trusted DataSecure when they\u2019re really viewing the criminal\u2019s DataSecure<br \/>\u2022 A user installs a piece of software with a light database in the backend. The database has a well-known default SA password, and supports passing through shell commands. This creates a back door into your domain.<\/p><p>\u00a0<\/p><\/div><\/div><div class=\"wpb_text_column wpb_content_element \"><div class=\"wpb_wrapper\"><p>These types of events occur too frequently to be detected by an annual penetration test. Periodic vulnerability management, ranging from daily to quarterly per year, is an excellent measure to ensure your network doesn\u2019t fall into an insecure state between penetration tests.<\/p><p>If you can\u2019t say for certain that \u201call vulnerabilities on my environment create only minimal and tolerant risks\u201d contact DataSecure Security and find out what the true risk your vulnerabilities actually are.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-469f3da1 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"469f3da1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-26cc9243 ot-flex-column-vertical\" data-id=\"26cc9243\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b6f877 elementor-widget elementor-widget-heading\" data-id=\"8b6f877\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\/\/ Drop us a line! We are here to answer your questions 24\/7<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-35be6d7d elementor-widget elementor-widget-heading\" data-id=\"35be6d7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">NEED CONSULTATION?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f86050c elementor-align-center elementor-widget elementor-widget-ibutton\" data-id=\"1f86050c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"https:\/\/datasecc.com\/contacts\/\" class=\"octf-btn octf-btn-primary\">Contact Us<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ VULNERABILITY MANAGEMENT Continuously Monitor Your Network Health If your applications are delivered with vulnerabilities attached \u2013 it won\u2019t matter how good your network security is. This is true whether they\u2019re hosted on-premise or in the cloud. While patching will resolve most vulnerabilities found on your network, others can have a bigger impact such as [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5707","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5707"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5707\/revisions"}],"predecessor-version":[{"id":5711,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5707\/revisions\/5711"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}