Source |
CSO |
Identifiant |
8302193 |
Date de publication |
2023-01-18 02:00:00 (vue: 2023-01-18 11:07:54) |
Titre |
Why it\'s time to review your on-premises Microsoft Exchange patch status |
Texte |
We start the patching year of 2023 looking at one of the largest releases of vulnerability fixes in Microsoft history. The January 10 Patch Tuesday update patched one actively exploited zero-day vulnerability and 98 security flaws. The update arrives at a time when short- and long-term technology and budget decisions need to be made.This is particularly true for organizations using on-premises Microsoft Exchange Servers. Start off 2023 by reviewing the most basic communication tool you have in your business: your mail server. Is it as protected as it could be from the threats that lie ahead of us in the coming months? The attackers know the answer to that question.To read this article in full, please click here |
Notes |
★★
|
Envoyé |
Oui |
Condensat |
2023 actively ahead answer arrives article attackers basic budget business: click coming communication could day decisions exchange exploited fixes flaws from full have here history january know largest lie long looking made mail microsoft months most need off one organizations particularly patch patched patching please premises protected question read releases review reviewing security server servers short start status technology term threats time tool true tuesday update using vulnerability when why year your zero |
Tags |
Tool
Vulnerability
Patching
|
Stories |
|
Move |
|