Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Waje & KCee Are All About That Forever Kind of Love in “Luvey Luvey”

    October 26, 2025

    The coolest new activities and things to do in Dubai

    October 26, 2025

    IT roles at top of remote jobs rebound after two-year decline

    October 26, 2025
    Facebook X (Twitter) Instagram
    • Home
    • Contact Us
    • About Us
    • Privacy Policy
    • Terms Of Service
    • Advertisement
    Sunday, October 26
    Facebook X (Twitter) Instagram Pinterest Vimeo
    ABSA Africa TV
    • Breaking News
    • Africa News
    • World News
    • Editorial
    • Environ/Climate
    • More
      • Cameroon
      • Ambazonia
      • Politics
      • Culture
      • Travel
      • Sports
      • Technology
      • AfroSingles
    • Donate
    ABSLive
    ABSA Africa TV
    Home»Technology»First line of defence: Critical cyber security vulnerability assessments
    Technology

    First line of defence: Critical cyber security vulnerability assessments

    Chris AnuBy Chris AnuApril 20, 2025No Comments4 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    First line of defence: Critical cyber security vulnerability assessments
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Peter Chan, cyber security operations manager, BlueVision ITM.


    Vulnerability assessments offer a great deal more than a checklist of potential cyber risks − they inform the organisation’s broader risk exposure, support continuous improvement, and simplify compliance and audit processes.

    In short − vulnerability assessments serve as the first line of defence for business in an ever-evolving threat environment.

    Ideally carried out every quarter, a thorough vulnerability assessment will assess internal and external vulnerabilities, common vulnerabilities and exposures, misconfigurations and potential human errors that could put the organisation, its systems and data at risk of attack.

    For in-house development teams that roll out new features quite often, it’s recommended that vulnerability assessments are done based on the release cycle, rather than quarterly.

    Backed by penetration testing, the assessment may also explore the potential impacts of vulnerabilities, looking into how hackers could exploit them within the organisation. It will also prioritise remediation based on the context and criticality of the vulnerabilities and provide guidelines on continuous improvement.

    The findings of a thorough vulnerability assessment are invaluable for IT security teams, risk departments and the organisation as a whole.

    In many cases, I find that IT teams have been aware of certain risks but having them confirmed by an independent third-party supports their budget motivation to mitigate the risk. In other cases, the discovery process uncovers legacy and decommissioned infrastructure that still presents a risk.

    Proactive threat management

    As an integral component of the threat management arsenal, vulnerability assessments are the foundation of proactive threat management − from the network all the way up to web apps and everything in between.

    Carried out regularly, it enhances the organisation’s cyber security posture by allowing it to stay ahead of vulnerabilities that are researched and discovered at an alarming rate.

    As part of the broader arsenal, the assessment provides visibility, but this visibility must be acted on.

    Every time there’s a new release of a version of the technology the company is using, it can enhance its security posture in accordance with whatever new features are available, or whatever patches have been made available between the last known visible state to the current state.

    It is particularly important for heavily regulated sectors, such as the health or financial sectors. For example, managing card payments requires PCI DSS security measures, which include regular vulnerability assessments. In the healthcare industry, standards like HIPAA require regular vulnerability assessments too.

    Around the world, industries recognise the importance of regular vulnerability assessments for business resilience, compliance and regulatory requirements.

    Despite their best intentions, many organisations overlook common vulnerabilities, such as decommissioned hardware and default passwords. On occasion, I’ve discovered Windows Server 2003 and 2008 that have long deprecated and yet are still connected to the internet.

    Default passwords and weak credentials are still key to many breaches. That said, user password vulnerabilities are being addressed by greater uptake of privilege management models, multi-factor authentication and stronger enforcement of password policies.

    However, default vendor passwords are still being used on systems like firewalls and IP camera systems.

    While the benefits of proactive vulnerability assessments and penetration are clear, some organisations delay these important measures due to cost concerns.

    It should be noted that the cost extends beyond the assessment itself. There are costs associated with remediating the vulnerability as well.

    As part of the broader arsenal, the assessment provides visibility, but this visibility must be acted on and the risks that have been identified must be managed.

    This means that the company may need to spend the resources to either upgrade outdated operating systems, which would have dependencies on applications, or any other user dependencies could require a network upgrade.

    Additional layers of defence may be required. And if there are any human issues or human misconfigurations, then the necessary training and awareness programmes need to be put in place to improve the situation.

    The continuous cycle of improvement that emerges from the vulnerability assessment may incur additional costs that are not often talked about, and often difficult to predict.

    With cyber risk proliferating, it is crucial to remember that if a company isn’t scanning its environment itself, someone else is − and they’re not divulging the results.

    By continuously or regularly carrying out assessments, the company is making sure what it sees is at an acceptable level of risk, and it’s gaining an understanding of how it could be seen and exploited by somebody else. That visibility provides that first line of defence.



    Source link

    Post Views: 7
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Chris Anu
    • Website

    Related Posts

    IT roles at top of remote jobs rebound after two-year decline

    October 26, 2025

    safeguard your business with Vox and Sophos

    October 26, 2025

    Survey examining local ICT maturity goes live

    October 26, 2025
    Leave A Reply Cancel Reply

    Top Posts

    Who is Duma Boko, Botswana’s new President?

    November 6, 2024

    Kamto Not Qualified for 2025 Presidential Elections on Technicality Reasons, Despite Declaration of Candidacy

    January 18, 2025

    As African Leaders Gather in Addis Ababa to Pick a New Chairperson, They are Reminded That it is Time For a Leadership That Represents True Pan-Africanism

    January 19, 2025

    BREAKING NEWS: Tapang Ivo Files Federal Lawsuit Against Nsahlai Law Firm for Defamation, Seeks $100K in Damages

    March 14, 2025
    Don't Miss

    Waje & KCee Are All About That Forever Kind of Love in “Luvey Luvey”

    By Prudence MakogeOctober 26, 2025

    Hey fans of classic highlife grooves, modern Afrobeats vibes, and soulful love anthems — Waje…

    Your Poster Your Poster

    The coolest new activities and things to do in Dubai

    October 26, 2025

    IT roles at top of remote jobs rebound after two-year decline

    October 26, 2025

    Tyrone SFC final: Loughmacrory make history with first title

    October 26, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Sign up and get the latest breaking ABS Africa news before others get it.

    About Us
    About Us

    ABS TV, the first pan-African news channel broadcasting 24/7 from the diaspora, is a groundbreaking platform that bridges Africa with the rest of the world.

    We're accepting new partnerships right now.

    Address: 9894 Bissonette St, Houston TX. USA, 77036
    Contact: +1346-504-3666

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Waje & KCee Are All About That Forever Kind of Love in “Luvey Luvey”

    October 26, 2025

    The coolest new activities and things to do in Dubai

    October 26, 2025

    IT roles at top of remote jobs rebound after two-year decline

    October 26, 2025
    Most Popular

    Did Paul Biya Actually Return to Cameroon on Monday? The Suspicion Behind the Footage

    October 23, 2024

    Surrender 1.9B CFA and Get Your D.O’: Pirates Tell Cameroon Gov’t

    October 23, 2024

    Ritual Goes Wrong: Man Dies After Father, Native Doctor Put Him in CoffinBy

    October 23, 2024
    Facebook X (Twitter) Instagram Pinterest YouTube
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    © 2025 Absa Africa TV. All right reserved by absafricatv.

    Type above and press Enter to search. Press Esc to cancel.