7-30-14 Weakness in the Android software that could allow attackers to take over devices, Major security flaws in the majority of networkable tvs, webcams, alarm systems and other home and office electronics, a security issue with Instagram on Apple mobile devices

“Opportunity is missed by most people because it is dressed in overalls and looks like work.”

– Thomas Edison


Vulnerability impacting multiple versions of Android could enable device takeover

http://www.scmagazine.com/vulnerability-impacting-multiple-versions-of-android-could-enable-device-takeover/article/363414/

http://www.securityweek.com/android-fake-id-vulnerability-lets-malicious-apps-impersonate-trusted-apps

C-IT Recommendation

  1. Perform an asset inventory of all company owned Android devices using company provided cell phone service. Your company should have a configuration management database to show which devices have which operating systems versions.
  2. Ensure anti-malware service is deployed on all company owned Android devices. If you have a mobile device management solution, enable the company webfiltering option where applicable and force the cellular devices to pass through the company webfilter/proxy before accessing the internet.
  3. Provide mobile device security awareness informing your employees not to visit malicious sites . Also, instruct employees not to apps from unofficial stores.

Article Resources

MP3 discussing FakeID Vulnerability

http://www.buzzsprout.com/9743/192579-bluebox-labs-explains-android-fake-id-vulnerability.mp3?client_source=small_player

Bluebox Security write up on the Android FakeID Weakness

http://bluebox.com/technical/android-fake-id-vulnerability/

Bluebox Security Scanner

https://play.google.com/store/apps/details?id=com.bluebox.labs.onerootscanner&hl=en


 

HP tests 10 popular IoT devices, most raise privacyconcerns

http://www.scmagazine.com/hp-tests-10-popular-iot-devices-most-raise-privacy-concerns/article/363426/

http://www.securityweek.com/70-iot-devices-vulnerable-cyberattacks-hp

HPs Recommendation

  1. Conduct a security review of your device and all associated components.
  2. Implement security standards that all devices must meet before production.
  3. Ensure security is a consideration throughout the product lifecycle.

Article Resources

HP Study Report

http://fortifyprotect.com/HP_IoT_Research_Study.pdf


 

Using Instagram on public Wi-Fi poses risk of an account hijack, researcher says

http://www.csoonline.com/article/2458952/data-protection/using-instagram-on-public-wi-fi-poses-risk-of-an-account-hijack-researcher-says.html

C-IT Recommendation

  1. Refrain from connecting apple mobile devices to public wifi networks especially if there are no passwords to login to the networks.

Article Resources

Stevie Graham’s Twitter Post

https://twitter.com/stevegraham/status/493465799542468608

Instagram Co-founders Response to the hack

https://news.ycombinator.com/item?id=8099796

7-29-14 Attacks originating from an Amazon cloud based technology platform, fourteen companies fined $5M pretending to provide AV Software the request from the Electronic Frontier Foundation to declare the NSA activities unconstitutional

“The golden rule for every business man is this: Put yourself in your customer’s place.”

Orison Swett Marden


Cybercriminals Abuse Amazon Cloud to Host Linux DDoS Trojans

http://www.securityweek.com/cybercriminals-abuse-amazon-cloud-host-linux-ddos-trojans

C-IT Recommendation

  1. Perform a risk analysis for utilizing cloud based services. Understand your limitations of using the cloud including
    1. Not having have total control
    2. Having your data protected by someone else
    3. Having your security managed by someone else
    4. Not having information about the cloud provider’s infrastructure
  2. As a result, Ensure your legal department has a strong SLA and breach accountability agreement with the cloud provider in case critical company or customer data is compromised
  3. Consider deploying technology in your organization that blocks DDoS attacks

Article Resources

Securelist blog about the Amazon attacks

https://securelist.com/blog/virus-watch/65192/elasticsearch-vuln-abuse-on-amazon-cloud-and-more-for-ddos-and-profit/

Gartner Application Delivery Controller Ratings

http://www.gartner.com/technology/reprints.do?id=1-1MCUHF2&ct=131030&st=sb


 

Companies accused of peddling bogus AV ordered to pay $5.1M

http://www.scmagazine.com/companies-accused-of-peddling-bogus-av-ordered-to-pay-51m/article/363212/

Companies Providing Bogus Antivirus:

Pecon Software Ltd. et al;

Marczak et al.;

PCCare247 Inc. et al.;

Finmaestros, LLC et al.;

Lakshmi Infosoul Serivces Pvt. Ltd. et al.; and

Zeal IT Solutions Pvt. Ltd. et al.

C-IT Recommendation

  1. Purchase credible security solutions from credible companies. Do not take the shortcuts.

Article Resources

Federal Trade Commission article and links to court documentation

http://www.ftc.gov/news-events/press-releases/2014/07/federal-court-orders-tech-support-scammers-pay-more-51-million


 

EFF asks court to find NSA internet spying a violation of Fourth Amendment

http://www.scmagazine.com/eff-asks-court-to-find-nsa-internet-spying-a-violation-of-fourth-amendment/article/363218/

Article Resources

EFF court filing requesting declaration of violation of Fourth Amendment

https://www.eff.org/files/2014/07/25/jewel_4th_a_mpsj_brief.pdf

 

7-28-14 A weakness impacting between 50,000 and 2 million websites, a survey highlighting how a significant number of organizations are leaving themselves open to cyber threats

“My own business always bores me to death; I prefer other people’s.”

―Oscar Wilde


WordPress Plugin Vulnerability Exploited to Compromise Thousands of Websites

https://www.securityweek.com/wordpress-plugin-vulnerability-exploited-compromise-thousands-websites

http://www.csoonline.com/article/2457668/data-protection/thousands-of-sites-compromised-through-wordpress-plug-in-vulnerability.html

C-IT Recommendation

From the Website Perspective

  1. Ensure your organization has a strong asset inventory with an accurate configuration management database.
  2. Identify if any of your websites are using WordPress and the MailPoet plugin.
    1. If so, backup the MailPoet configuration and update to at least version 2.6.8.
  3. Ensure your company is using a strong Web Code review process before publishing sites.
  4. Use a software code security analysis tool to check your website for potential vulnerabilities.

Article Resources

Securi’s Blogposting of MailPoet’s Weaknesses

http://blog.sucuri.net/2014/07/mailpoet-vulnerability-exploited-in-the-wild-breaking-thousands-of-wordpress-sites.html

MailPoet’s support documenation regarding its security weakness

http://support.mailpoet.com/knowledgebase/site-hacked-what-to-do/


 

Survey: 53 percent change privileged logins quarterly

http://www.scmagazine.com/survey-53-percent-change-privileged-logins-quarterly/article/362958/

C-IT Recommendation

  1. Ensure your organization has a password policy that requires privileged accounts to differ between various  including not utilizing the same passwords on multiple systems.
  2. Ensure your  password policy require complex passwords and that systems are configured to enforce the requirement. Require passwords to expire on systems within 30-90 day window. Do not allow users to use the same passwords for privileged accounts consecutively after the passwords expire.

Article Resources

Lieberman 2014 Survey of Information Security Professionals

http://media.scmagazine.com/documents/88/liberman_survey_21915.pdf

 

7-25-14 A class action law suit filed against eBay after data breach, Sony’s $15 Million Settlement pay out for its 2011 data breach

“Good executives never put off until tomorrow what they can get someone else to do today.”

-Anonymous


eBay faces class-action suit over breach

http://www.scmagazine.com/ebay-faces-class-action-suit-over-breach/article/362670/

http://www.csoonline.com/article/2457981/data-protection/ebay-faces-class-action-suit-over-data-breach.html

Article Resources

Ebay’s publication of Breach

http://www.ebayinc.com/in_the_news/story/ebay-inc-ask-ebay-users-change-passwords

The Courtroom Paperwork for the Lawsuit

http://media.scmagazine.com/documents/88/ebaysuit_21893.pdf


 

Sony to shell out $15M in PSN breach settlement

http://www.scmagazine.com/sony-to-shell-out-15m-in-psn-breach-settlement/article/362720/

Article Resources

Original Court Filings

http://media.scmagazine.com/documents/88/sony_settlement-1_21903.pdf

Settlement Court Documents

http://www.scribd.com/doc/234917930/Sony-agrees-to-15M-settlement

C-IT Recommendation

  1. Validate your organization has an efficient Security Operations Center (SOC) of which trained analysts are trained to alert on potential malicious events or malicious sources.
  2. Ensure your organization has a security incident investigation process that includes discovering breach, and disclosing the breach. Validate your process aligns with the requirements of your regions regulations.
  3. Ensure your organization has an incident response plan in the case of a data breach
    1. Incident Response Team
    2. Public Relations Strategy
    3. Legal Team
  4. Consult your Risk Management team to see if your company has any cybersecurity insurance.
  5. If you have coverage, ensure the organization has performed an information security risk assessment to see if the current coverage is adequate for your company’s risk appetite. If you do not have coverage, consider performing an information security risk assessment to transfer potential financial loss in case there is a need to pay for forensic investigations, credit monitoring, reputation management, business interruption, and compliance with state breach notification laws in the case of a data breach.

7-24-14 A cyber attack that may have cost ticket sales giant StubHub $10 million in tickets, a survey revealing the continued concerns of companies’ bring your own device practices

“The two basic processes of education are knowing and valuing.”

-Robert J. Havighurst


StubHub Hit in Cyber-Attack That May Have Stolen $10M in Tickets

http://www.securityweek.com/stubhub-hit-cyber-attack-may-have-stolen-10m-tickets

http://www.scmagazine.com/six-charged-in-global-stubhub-scheme-company-defrauded-out-of-1-million/article/362482/

C-IT Recommendation

  1. Ensure your organization has a security awareness program that educates users on basic security practices including not utilizing the same passwords on multiple systems.
  2. Ensure your systems require complex passwords. Require passwords to expire on systems within 30-90 day window. Do not allow users to use the same passwords consecutively after the passwords expire.
  3. Consider using a password management program to allow users to store credentials for various accounts in a centralized repository. Encourage users to utilize a very strong password to authenticate to the password manager.

Article Resources

Krebs on Security Article

http://krebsonsecurity.com/2014/07/feds-hackers-ran-concert-ticket-racket/#more-27031

Microsoft Report: Sustainably Managing Large Numbers of Accounts

http://research.microsoft.com/pubs/217510/passwordPortfolios.pdf


 

InfoSec pros worried BYOD ushers in security exploits, survey says

http://www.scmagazine.com/infosec-pros-worried-byod-ushers-in-security-exploits-survey-says/article/362484/

http://www.darkreading.com/cloud/infographic-with-byod-mobile-is-the-new-desktop/a/d-id/1297436?

C-IT Recommendation

  1. Ensure your organization has a clear and concise mobile device policies to ensure proper use of personal phones while accessing corporate resources.
  2. Procure and deploy a mobile device management solution, with the following capabilities:
    1. Webfiltering option which forces the cellular devices to pass through the company webfilter/proxy before accessing the internet.
    2. Anti-malware for mobile devices
    3. If possible, device segmentation that restricts non-business applications from accessing business apps.
    4. Segmentation of business data and applications from

Provide mobile device security awareness informing your employees not to visit malicious websites. Also, instruct employees not to apps from unofficial stores

**If you do not have a mobile device management solution in a BYOD model, Strongly recommend users to install the security updates. Failure to do so may result in your employees devices compromising your company information and/or costing the employees or your organization a ton of money.**

Article Resources

Vectra BYOD & Mobile Security Report

http://vectranetworks.hs-sites.com/byod-and-mobile-security-report-payoff?submissionGuid=ef654d16-1ce2-4a6c-ae65-7c2424b76d5f

7-23-14 Consumer distrust of retailers handling of their personal information, Wall Street Journal and Vice.com hack, a possible hack of Goodwill Industries

“Every man, however wise, needs the advice of some sagacious friend in the affairs of life.”

-Plautus


Quarter of UK Shoppers Don’t Trust Retailers on Card Fraud

http://www.infosecurity-magazine.com/view/39417/quarter-of-uk-shoppers-dont-trust-retailers-on-card-fraud/

C-IT Recommendation

  1. Pay attention to the news regarding data breach.
  2. Communicate your security efforts to your customer base
  3. Provide customer awareness and communicate the importance of the customer taking steps to combat card fraud because the largest segments of consumers  interviewed did not recall having received any info from their financial institutions about how to protect themselves against fraud.

Article Resources

2014 Global Consumer Fraud Survey

http://www.aciworldwide.com/2014fraudsurvey.aspx

ACI Webinar on Global Consumer Fraud

http://bcove.me/xvc5e0a5


 

Vice.com hacked, possibly The Wall Street Journal website too

http://www.scmagazine.com/vicecom-hacked-possibly-the-wall-street-journal-website-too/article/362087/

C-IT Recommendation

  1. Ensure your domain hosting sites have strong secure passwords.
  2. Ensure your social media manager and other content management teams have strong secure passwords. Those passwords should not be the same password as any of their other passwords including their personal email, or their business email.
  3. Ensure your login services have a login attempt limit and locks out accounts after a certain amount of bad attempts.
  4. Ensure your company is using a strong Web Code review process before publishing sites
  5. Use a software code security analysis tool to check your website for potential vulnerabilities
  6. Require your security team to perform penetration testing after any code changes to your externally facing websites.
  7. If websites are deemed vulnerable after penetration testing, require through policy that the web development teams roll back to the previous version of the website until vulnerabilities are resolved

Article Resources

w0rm’s twitter posts revealing hacks

https://twitter.com/rev_priv8


 

Goodwill Industries investigates suspected payment card breach

http://www.csoonline.com/article/2456605/data-protection/goodwill-industries-investigates-suspected-payment-card-breach.html

C-IT Recommendation

  1. Ensure your organization has Firewalls/Intrusion Prevention Solutions in place that is capable of block incoming attempts from bad reputation IP addresses from countries on the watch list.
  2. Verify your security appliances are reporting to a Security Information and Event Management tool (SIEM) that correlates events and displays intelligible information to security analysts.
  3. Validate your organization has an efficient Security Operations Center (SOC) of which trained analysts are trained to alert on potential malicious events or malicious sources.
  4. Ensure your organization has an incident response plan in the case of a data breach
    1. Incident Response Team
    2. Public Relations Strategy
    3. Legal Team
    4. Possibly Data Breach Insurance

Article Resources

Krebs on Security Article

http://krebsonsecurity.com/2014/07/banks-card-breach-at-goodwill-industries/

CNN Money Article

http://money.cnn.com/2014/07/22/news/companies/goodwill-security-credit-card/

 

7-22-14 A study revealing prevalent password misuse in American businesses, Wall Street Journals Facebook account compromised Backdoor, a severe weakness in the Apple mobile device software that reveals private information

“He that will not reason is a bigot; he that cannot reason is a fool; and he that dares not reason is a slave.”

-Sir William Drummond


Password Misuse is Rampant at US Businesses

http://www.infosecurity-magazine.com/view/39408/password-misuse-is-rampant-at-us-businesses/

C-IT Recommendation

  1. Ensure your organization has a security awareness program that educates users on basic security practices including not utilizing the same passwords on multiple systems
  2. Ensure your systems require complex passwords. Require passwords to expire on systems within 30-90 day window. Do not allow users to use the same passwords consecutively after the passwords expire.
  3. Consider using a password management program to allow users to store credentials for various accounts in a centralized repository. Encourage users to utilize a very strong password to authenticate to the password manager

Article Resources

US CERT Security Tip Choosing and Protecting Passwords

https://www.us-cert.gov/ncas/tips/ST04-002


 

Fake Air Force One Crash Messages Posted on Hacked WSJ Facebook Page

http://www.securityweek.com/fake-air-force-one-crash-messages-posted-hacked-wsj-facebook-page

C-IT Recommendation

  1. Ensure your domain hosting sites have strong secure passwords
  2. Ensure your social media manager and other content management teams have strong secure passwords. Those passwords should not be the same password as any of their other passwords including their personal email, or their business email.
  3. Ensure your login services have a login attempt limit and locks out accounts after a certain amount of bad attempts.

Article Resources

US CERT White Paper : Using Social Networking Services Securely

http://www.us-cert.gov/sites/default/files/publications/safe_social_networking.pdf


 

Researcher finds backdoors in Apple iOS

http://www.csoonline.com/article/2455975/data-protection/researcher-finds-backdoors-in-apple-ios.html

Article Resources

Jonathan Zdziarski blog

http://www.zdziarski.com/blog/

Identifying back doors, attack points, and surveillance mechanisms in iOS devices Post in Science Direct

http://www.sciencedirect.com/science/article/pii/S1742287614000036

7-18-14 A report revealing that over half of company executives speak to their security teams less than twice a year, a study revealing that privileged user accounts are the root to most breaches

“The successful man is the one who finds out what is the matter with his business before his competitors do.”

–Roy L. Smith


31 percent of IT security teams don’t speak to company execs

http://www.scmagazine.com/report-31-percent-of-it-security-teams-dont-speak-to-company-execs/article/361263/

C-IT Recommendation

  1. Corporate leaders must establish a security debrief cadence with the information security teams. CSOs/CISO’s should meet with operational teams weekly to understand internal security risks. CSO/CISO’s should then meet with  CFOs, CEOs, CIOs monthly or bi-weekly to communicate priority risks to the business. Executives should be prepared to provide feedback and decisions to the information security organizations.
    1. Material to be covered
      1. Current Risks (including potential severity and probability)
      2. Emerging Risks (including potential severity and probability)
      3. Plan to address Risks (Avoidance, Mitigation, Transfer, Acceptance)
      4. Monitoring Progress of Risk Handling
  2. Develop a security awareness and education program which requires employees to attend some form of training. Reinforce training with periodic awareness campaigns to remind users of their role in protecting the organization.

Article Resources

Websense/Ponemon Institute Roadblocks, Refresh, & Raising the Human Security IQ Report

http://www.websense.com/content/2014-ponemon-report-part-2.aspx?cmpid=prnr7.17.14


 

Privileged Accounts at Root of Most Data Breaches

http://www.infosecurity-magazine.com/view/39366/privileged-accounts-at-root-of-most-data-breaches/

C-IT Recommendation

  1. Verify your company has an effective and enforced data classification standard which requires data owners to seriously assess data sensitivity and requires data custodians to properly secure the information to need-to-know only basis.
  2. Ensure your organization has a solid data storage policy which requires confidential data to be stored in secure, encrypted locations
  3. Perform periodic access reviews for data stores and applications housing highly classified or confidential information to ensure appropriate access is enforced. Any users or groups who are discovered to have access and don’t have a need to have access should be immediately removed.
  4. Confirm network segmentation in your environment so that only required devices are able to access networks where highly classified or confidential data resides.

Article Resources

The Role of Privileged Accounts in High Profile Breaches

http://cyberark.com/contact/role-privileged-accounts-high-profile-breaches#.U8gbyvldWSo

 

7-17-14 The prevalance of malware on Amazon web hosted services web sites, the lack of budget being provided for increased protection for computers in companies

“We generate fears while we sit. We over come them by action. Fear is natures way of warning us to get busy.”

-Dr. HenryLink


Amazon Web Services Increasingly Used to Host Malware

http://www.securityweek.com/amazon-web-services-increasingly-used-host-malware-report

C-IT Recommendation

  1. Perform an information security risk assessment to see if the partnering organization handles risk in accordance with your company’s risk appetite.
  2. Ensure your organization’s legal team has a Service Level Agreement with the partnering organization that specifies tolerance for security incidents and clearly define responsibility and accountability in a data breach.

Article Resources

Solutionary Second Quarter 2014 Threat Intelligence Report

http://www.solutionary.com/_assets/pdf/research/sert-q2-2014-threat-intelligence.pdf


 

Endpoints Are Woefully Insecure, But There’s No Budget to Fix It

http://www.infosecurity-magazine.com/view/39346/endpoints-are-woefully-insecure-but-theres-no-budget-to-fix-it/

C-IT Recommendation

  1. Ensure your organization has Firewalls/Intrusion Prevention Solutions in place that will block incoming attempts to infect PCs with a crimeware kit
  2. Ensure your organization has a solid anti-malware solution at the end point and that all endpoints are covered.
  3. Enforce a patch management standard in your organization which requires security patches to be deployed in the production environment within a reasonable time after they are tested within your test environment.
  4. Test business functionality of each type of device and record any issues impacting any business functions on the devices.
  5. If no issues result in the testing, deploy the security updates to the production systems. If functionality impacting issues occur on the test devices, engage Adobe support and/or vendor support if specific applications are negatively impacted.
  6. Consult with your Vulnerability and Threat Management Team (VTM) to verify all production systems are patched with the latest updates.
  7. Perform an asset inventory of all computers running Windows XP Operating system.
  8. Develop a deployment plan to upgrade all Windows XP OS systems to a Microsoft supported OS or purchase additional support for your Windows XP machines from Microsoft to receive Microsoft XP patch releases.
  9. Implement an advanced malware solution such as Invincea Freespace, FireEye Web Security (NX Series), Source Fire FireAmp to

Article Resources

Promisec Survey

http://www.promisec.com/?attachment_id=6416

7-16-14 A major system weakness existing in 95% of fortune 1000 companies, a survey revealing the incorrect reporting of the majority of organizational security incidents, Oracle’s quarterly patch releases

“Even if you are on the right track, You’ll get run over if you just sit there.”

– Will Rogers


Active Directory flaw opens enterprise services to unauthorized access

http://www.scmagazine.com/active-directory-flaw-opens-enterprise-services-to-unauthorized-access/article/361017/

http://www.securityweek.com/active-directory-vulnerability-puts-enterprise-services-risk

http://www.darkreading.com/active-directory-flaw-lets-attackers-change-passwords/d/d-id/1297298?

http://www.csoonline.com/article/2454367/identity-access/why-the-microsoft-active-directory-design-flaw-isnt-serious.html

Aorato Mitigation Techniques

  1. Detecting authentication protocol anomalies. For instance, the use of a non-default encryption algorithm.
  2. Identifying the attack by correlating the abnormal use of encryption methods with the context in which the victim’s identity is used (e.g. unusual services accessed, unusual time of day, day of week, etc.).
  3. Applying measures to reduce the attack surface. Note that these measures only reduce the attack surface and do not eliminate it altogether or solve the root cause:
  4. Limiting the attacker’s opportunities to steal the NTLM hash in the first place. This is detailed in Microsoft document “Mitigating Pass-the-Hash (PtH) Attacks and Other Credential Theft Techniques”. However, it is important to note that this provides only partial mitigation as detailed in our blog post “Windows Update to Fix Pass-the-Hash Vulnerability? Not!”.
  5. Ensuring that Windows-based computers in the enterprise are updated with the kb2871997 patch, in which several protections had been introduced to make it harder for the attacker to steal the NTLM hashes.
  6. If using Windows Server 2012 R2 Domain Functional Level (DFL) domains, add privileged users as members of the newly added Protected Users group. This will disable RC4-HMAC usage in Kerberos for these users. Note that this measure is suitable only for privileged users since the Protected Users group imposes many other restrictions on its members.

Microsoft’s Recommendation

  1. Use a smart card authentication and second,
  2. Remove the weaker encryption (i.e. RC4-HMAC) from the systems.

Article Resources

Aorato Blog Detailing Microsoft Weakness

http://www.aorato.com/blog/active-directory-vulnerability-disclosure-weak-encryption-enables-attacker-change-victims-password-without-logged/

Microsoft in Talks to Buy Israeli Cybersecurity Firm Aorato

http://online.wsj.com/articles/microsoft-in-talks-to-buy-israeli-cybersecurity-firm-aorato-1405430773


 

77 percent of IT staffers have incorrectly reported the cause of a security incident

http://www.scmagazine.com/survey-77-percent-of-it-staffers-have-incorrectly-reported-the-cause-of-a-security-incident/article/360993/

C-IT Recommendation

  1. Ensure your organization has Firewalls/Intrusion Prevention Solutions in place that is capable of block incoming attempts from bad reputation IP addresses from countries on the watch list.
  2. Verify your security appliances are reporting to a Security Information and Event Management tool (SIEM) that correlates events and displays intelligible information to security analysts.
  3. Validate your organization has an efficient Security Operations Center (SOC) of which trained analysts are trained to alert on potential malicious events or malicious sources.
  4. Ensure your organization has an incident response plan in the case of a data breach
    1. Incident Response Team
    2. Public Relations Strategy
    3. Legal Team
    4. Possibly Data Breach Insurance

Article Resources

2014 Emulex Visibility Survey

http://www.emulex.com/media-center/media-center-home/press-releases/story/?tx_news_pi1[news]=566&cHash=b9dbbcbde3fe8791bfe1e26610b2c3df


 

Oracle releases 113 bug fixes in Critical Patch Update

http://www.scmagazine.com/oracle-releases-113-bug-fixes-in-critical-patch-update/article/361039/

http://www.securityweek.com/security-updates-java-7-will-work-windows-xp-oracle

  1. Enforce a patch management standard in your organization which requires security patches to be deployed in the production environment within a reasonable time after they are tested within your test environment.
  2. Test business functionality of each type of device and record any issues impacting any business functions on the devices.
  3. If no issues result in the testing, deploy the security updates to the production systems. If functionality impacting issues occur on the test devices, engage Oracle support and/or vendor support if specific applications are negatively impacted.
  4. Consult with your Vulnerability and Threat Management Team (VTM) to verify all production systems are patched with the latest updates.
  5. Perform an asset inventory of all systems running Oracle components .
  6. Implement an advanced malware solution such as Invincea Freespace, FireEye Web Security (NX Series), Source Fire FireAmp to keep remote connections from initiating from your internal network.