• LinkedIn
  • Twitter
  • Google+
.
|
TechRecs: Cool Tools & Hot Topics
|
12 Hardware and Software Vulnerabilities You Should Address Now
Posted on October 13, 2016 by

vulnerabilityHardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP.

It’s not a stretch to say that most organizations have at least some old hardware and software still in use. An old computer that’s still chugging along, running an old operating system and perhaps an application that is hard to replace, doesn’t necessarily raise a red flag with IT staff. Why spend money on new equipment or software if what’s already in-house is adequate and functioning?

Walker White, president of BDNA, a company that tracks and analyzes end-of-life (EOL) data for hardware, software and medical devices, says that the main problem with out-of-date software and legacy hardware is that once they pass their EOL cycle, the vendor no longer maintains or supports the products, resulting in security vulnerabilities and risk to organizations. As BDNA’s State of the Enterprise Report (Q2 2016) indicates, many organizations are unaware of the potential liabilities, which can cost millions of dollars in the case of a successful attack after a vulnerability is exploited.

Here’s a look at the hardware, software and mobile device vulnerabilities you should tackle now to reduce risk and increase security.

Older PCs, laptops and notebooks

White maintains that although software represents a much greater risk than hardware, many hardware vulnerabilities are actually software based. The main problem with older computers is that a lot of that equipment doesn’t have built-in security features, such as Unified Extensible Firmware Interface (UEFI) with Secure Boot, a self-healing basic input/output system (BIOS), preboot authentication, self-encrypting drives and the like. Although these features can’t prevent breaches 100 percent of the time (and what can?), they greatly improve the security of business and personal computers overall.

Items to eliminate from your organization’s computer inventory:

Computers with conventional BIOS: Older PCs, as well as laptops and notebooks, with conventional BIOS cannot run Secure Boot, a feature of UEFI that was first added in Microsoft Windows 8 and now appears in newer editions, as well as Windows Server. Secure Boot helps to prevent malware from loading onto a computer during the boot process. For added protection, HP’s SureStart technology, which was introduced in 2013, detects corrupt or compromised BIOS code before it even loads, and then automatically copies over it with a “good” digitally signed version if necessary.

Computers without preboot authentication (PBA) or a Trusted Platform Module (TPM): As yet another level of protection, PBA prevents the operating system from loading until the user enters authentication information, such as a password. PBA kicks in after the BIOS loads but before the OS boots. This feature has been around for several years and has been replaced in some computers by Microsoft BitLocker using TPM.

Old routers: Aimed mainly at small offices/home offices (SOHOs), old routers — especially those manufactured in 2011 and earlier — can have serious vulnerabilities.

Drives that don’t self-encrypt: Available since 2009, self-encrypting drives, or SEDs, are especially important for mobile computers. An SED requires a password in addition to the OS login password, and the technology automatically encrypts and decrypts data on the drive.

Another consideration is the use of old hard drives in general. Deb Shinder, a technology and security consultant, trainer and writer, points out that even when old hard drives are not a direct security threat, they make you vulnerable to data loss because they are prone to failure.

Addressing software vulnerabilities

Where hardware fixes and upgrades typically require plunking down cash, fixing software vulnerabilities often involves inexpensive or even free updates. The following list covers types of software that must be kept current, patched or replaced as soon as possible:

Unpatched or out-of-date operating systems: In April 2014, Microsoft ended support for Windows XP, which means neither automatic updates nor technical assistance is available. According to Microsoft, even if you run some type of antivirus software on Windows XP, it has “limited effectiveness on PCs that do not have the latest security updates.” Shinder warns against running old server OSes, such as Windows Server 2003 and earlier, which provide “far fewer security features” than more modern OSes, and that old FTP servers sitting around on the network, typically infrequently used, present an attack surface that admins might overlook.

Unpatched or out-of-date productivity software: Running unpatched versions of Microsoft Office, especially older versions like Office 2002, Office 2003 and Office 2007, is risky. A common vulnerability is the potential for remote code execution when a user opens or previews a maliciously prepared file or visits a website containing content that exploits the vulnerability. If successful, an attacker can gain access to the user’s system, which is a substantial security risk if the user has administrative privileges.

Legacy custom applications: According to Shinder, many organizations continue to run legacy software that was custom written for them, even when the vendor has gone out of business and can no longer provide updates or patches. “For those organizations, the idea of starting over with a new application or a custom development project may seem overwhelming. However, legacy software wasn’t coded with today’s more sophisticated attacks in mind,” says Shinder, leaving it highly vulnerable if exposed to the internet or in an environment with inadequate security controls.

Unpatched web browsers: Browser vulnerabilities are widespread; no browser is entirely free of security vulnerabilities. Common vulnerabilities include URL spoofing, cross-site scripting, injection attacks, exploitable viruses, buffer overflow, ActiveX exploits and many more. The bottom line: run the most current version of your preferred web browser and update it as soon as updates become available.

Out-of-date plug-ins: An easy target for attackers are out-of-date browser plug-ins for software used on the web, and the plug-ins with the most vulnerabilities are related to Adobe PDF and Adobe Flash (also known as Shockwave Flash), as well as Java and Microsoft Silverlight. WordPress plug-ins have also fallen victim to a number of security vulnerabilities, so much so that WordPress offers a plug-in to check the vulnerability of other WordPress plug-ins.

Changing protocols

When the TCP/IP suite of protocols was first developed and the internet was in its infancy, security wasn’t the highest priority. Things have changed, dramatically. Many communications protocols have been revised or replaced with security built in. One of the more recent changes is the switch from Secure Sockets Layer (SSL), which runs on top of TCP/IP, to its successor, Transport Layer Security (TLS).

Both protocols provide data encryption and authentication between applications and servers, such as a web browser and web server, and are designed to allow for secure communications over the internet. However, the “secure” in SSL is now an oxymoron due to well-documented vulnerabilities.

In fact, even TLS 1.0 and some implementations of TLS 1.1 are considered insecure, with experts recommending the use of TLS 1.2 and later. That means web servers should be running the latest version of TLS, especially those that host e-commerce platforms. PCI DSS 3.1, the latest standard for payment card security, removed SSL and those early versions of TLS from its list of approved encryption standards.

BDNA’s White also warns against flaws in TCP. He cites a serious vulnerability in TCP running on Linux that uses side channels. An attacker can get ahead of packet sequencing by knowing the IP addresses of the sender and receiver, and then intercept packets and insert malicious content. This vulnerability has been around for several years but was only recently uncovered, resulting in patches for the next version of the Linux OS.

Mobile and internet of things devices

The explosion of mobile and IoT device use has made work and personal life easier in many ways, but has ushered in a bevy of security concerns at the same time. Here are a few of the more pressing concerns regarding mobile and IoT:

Old mobile devices and OSes: Some devices with old OSes can’t be updated, and security updates are supported for a limited time. For example, the iPhone 3 and earlier models (those sold before October 2011) can’t run the latest version of iOS, which has lots of security features baked in. Android devices are more difficult to pin down because of multiple phone vendors with multiple products that run the OS. Keep in mind that Google provides security updates for Android for three years from release, and upgrades to a new version of Android for two years from release.

Old IoT devices: According to Shinder, old IoT devices from “back before we called it IoT” that are network enabled, such as old IP cameras used for surveillance, don’t get regular updates and often are using insecure protocols. With the state of IoT security lacking in general, having older devices in the
mix only makes it worse.

Next steps

US-CERT recommends application whitelisting, keeping applications and OSes patched and up to date, and restricting administrative privileges to applications and OSes as a strategy for reducing risk.

Organizations should also automate as much as possible, which includes allowing for OS and application updates unless administrators have a specific reason not to. To keep SoHo routers current, update the firmware by using the push-button update mechanism, if available, or download an update from the manufacturer’s support site and install it. Regarding mobile devices, keep them updated with the latest software and teach users to download apps only from trusted sources, such as the Apple Store or Google Play.

Staying on top of vulnerability information is critical to protecting IT environments. One good source is the US-CERT Alerts webpage, as well as The MITRE Corporation’s Common Vulnerabilities and Exposures (CVE) list. For organizations that run Microsoft products, check the Microsoft TechNet security advisories and bulletins regularly or sign up to receive security notifications via RSS or email.

Another option is to subscribe to a third-party catalog of vendor and product details, such as BDNA’s Technopedia. These type of services gather data, and then translate and normalize it to use standard language and terms, eliminating variant names for a single vendor, single product and/or version of a product.

This story, ” 12 hardware and software vulnerabilities you should address now” was originally published by Kim Lindros for CIO.

Posted in TechRecs: Cool Tools & Hot Topics, Small Business IT Management, IT Solutions - Stay Secure, ITs Easy Being Green
TechRec: Betterspot Portable VPN Seeks to Make Browsing Secure Everywhere
Don’t Let Network Outages Bring Down Your Business

Related Posts

  • Google Chrome Is Rolling Out New Privacy Features

    The Google Chrome web browser is constantly evolving, with major updates rolling out faster than
    read more
  • Older Apps Could be Putting Your Smartphone at Risk — Here’s Why

    If your smartphone is full of apps you no longer use, you should probably consider
    read more
  • I Just Found My Favorite New Keyboard Shortcut — And It Works on Any Browser

    Ever close important tabs by accident when browsing online using your PC or Mac? Of
    read more
  • 9 VOIP Security Best Practices to Consider for Your Business

    Voice over IP systems handle critical communication features such as business phone calls, conferencing, chat
    read more
Logging In...

Profile cancel

Sign in with Twitter Sign in with Facebook
or

Not published

TO WEBSITE >>
launchpadonline.com

CATEGORIES

  • Launch Pad News
  • TechRecs: Cool Tools & Hot Topics
  • Small Business IT Management
  • Small Business Web Strategies
  • IT Solutions – Cloud | Mobile
  • IT Solutions – Stay Secure
  • ITs Easy Being Green
  • RevITup TechCare Client Forum
  • GreenBack Nonprofit Wish List
  • Launch Pad Franchise Forum
  • Launch Pad Partner News

Cloud Computing in Plain English

Copyright © 2023 | Privacy Policy
  • LinkedIn
  • Twitter
  • Google+

Archives

  • January 2023 (3)
  • December 2022 (2)
  • November 2022 (2)
  • October 2022 (2)
  • September 2022 (3)
  • August 2022 (3)
  • July 2022 (2)
  • June 2022 (3)
  • May 2022 (2)
  • April 2022 (2)
  • March 2022 (2)
  • February 2022 (3)
  • January 2022 (2)
  • December 2021 (2)
  • November 2021 (3)
  • October 2021 (3)
  • September 2021 (3)
  • August 2021 (3)
  • July 2021 (2)
  • June 2021 (4)
  • May 2021 (3)
  • April 2021 (2)
  • March 2021 (2)
  • February 2021 (3)
  • January 2021 (2)
  • December 2020 (2)
  • November 2020 (2)
  • October 2020 (4)
  • September 2020 (2)
  • August 2020 (3)
  • July 2020 (2)
  • June 2020 (3)
  • May 2020 (2)
  • April 2020 (3)
  • March 2020 (3)
  • February 2020 (3)
  • January 2020 (4)
  • December 2019 (3)
  • November 2019 (2)
  • October 2019 (4)
  • September 2019 (3)
  • August 2019 (4)
  • July 2019 (2)
  • June 2019 (3)
  • May 2019 (3)
  • April 2019 (3)
  • March 2019 (3)
  • February 2019 (3)
  • January 2019 (4)
  • December 2018 (3)
  • November 2018 (4)
  • October 2018 (3)
  • September 2018 (2)
  • August 2018 (3)
  • July 2018 (3)
  • June 2018 (3)
  • May 2018 (2)
  • April 2018 (3)
  • March 2018 (3)
  • February 2018 (3)
  • January 2018 (3)
  • December 2017 (3)
  • November 2017 (4)
  • October 2017 (3)
  • September 2017 (4)
  • August 2017 (4)
  • July 2017 (4)
  • June 2017 (3)
  • May 2017 (5)
  • April 2017 (4)
  • March 2017 (4)
  • February 2017 (5)
  • January 2017 (4)
  • December 2016 (3)
  • November 2016 (4)
  • October 2016 (4)
  • September 2016 (4)
  • August 2016 (5)
  • July 2016 (4)
  • June 2016 (5)
  • May 2016 (3)
  • April 2016 (4)
  • March 2016 (4)
  • February 2016 (3)
  • January 2016 (3)
  • December 2015 (4)
  • November 2015 (4)
  • October 2015 (3)
  • September 2015 (3)
  • August 2015 (3)
  • July 2015 (3)
  • June 2015 (5)
  • May 2015 (4)
  • April 2015 (6)
  • March 2015 (4)
  • February 2015 (2)
  • January 2015 (5)
  • December 2014 (4)
  • November 2014 (3)
  • October 2014 (8)
  • September 2014 (5)
  • August 2014 (2)
  • July 2014 (3)
  • June 2014 (6)
  • May 2014 (3)
  • April 2014 (6)
  • March 2014 (5)
  • February 2014 (3)
  • January 2014 (5)
  • December 2013 (4)
  • November 2013 (4)
  • October 2013 (6)
  • September 2013 (3)
  • August 2013 (5)
  • July 2013 (6)
  • June 2013 (4)
  • May 2013 (3)
  • April 2013 (4)
  • March 2013 (4)
  • February 2013 (3)
  • January 2013 (5)
  • December 2012 (4)
  • November 2012 (5)
  • October 2012 (5)
  • September 2012 (6)
  • August 2012 (6)
  • July 2012 (6)
  • June 2012 (3)
  • May 2012 (7)
  • April 2012 (6)
  • March 2012 (10)
  • February 2012 (6)
  • January 2012 (5)
  • December 2011 (7)
  • November 2011 (9)
  • October 2011 (4)
  • September 2011 (4)
  • August 2011 (11)
  • July 2011 (14)
  • June 2011 (4)
  • May 2011 (11)
  • April 2011 (8)
  • March 2011 (11)
  • February 2011 (11)
  • January 2011 (21)
  • December 2010 (10)
  • November 2010 (10)
  • October 2010 (8)
  • September 2010 (10)
  • August 2010 (12)
  • July 2010 (8)
  • June 2010 (9)
  • May 2010 (8)
  • April 2010 (7)
  • March 2010 (10)
  • February 2010 (8)
  • January 2010 (6)
  • December 2009 (7)
  • November 2009 (13)
  • October 2009 (11)
  • September 2009 (16)
  • August 2009 (13)
  • July 2009 (16)
  • June 2009 (18)
  • May 2009 (16)