Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

U.S. Government Taking Steps Toward Protecting Data

U.S. Government Taking Steps Toward Protecting Data

Do you remember the series of high-profile infrastructure attacks that occurred not so long ago this year? Well, now the United States government is taking matters into its own hands by ordering the patching of various vulnerabilities in affected systems. It’s a massive effort to thwart hackers and other cyberthreats from taking root in vulnerable systems.

This directive was issued by the Cybersecurity and Infrastructure Security Agency (CISA), and it has due dates ranging from November of 2021 all the way to May of 2022. CISA is pushing for all federal agencies and organizations to resolve a certain series of known, exploited vulnerabilities during this timeframe, with some notable exceptions for national security-related infrastructures.

This catalog of known, exploited vulnerabilities can be found on CISA’s website. The catalog includes all sorts of information on each known vulnerability, and all of them (around 300 or so) are believed to pose some sort of risk to the federal government. This catalog also contains links to the NIST database for guidance on how to apply patches and resolve these vulnerabilities.

This is a massive undertaking and one that will inevitably lead to some confusion as patches are deployed and administered—especially since each of the departments are responsible for deploying their own updates and are only accountable to CISA. That said, CISA is putting some pressure on these organizations to meet specific objectives and requirements within a set amount of time.

The timeline for deploying these patches and updates varies, but within 60 days, agencies must review and update their policies on vulnerability management. These policies and procedures must then be furnished upon request. Agencies must also have a policy in place for deploying the directive from CISA, a process that is incredibly involved. Organizations will have to identify who is responsible for what, as well as how they plan to track and report on the implementation process.

Patch management can be difficult for governments, but it’s even more challenging for small businesses that don’t have the seemingly limitless spending power and other resources afforded to larger organizations and enterprises. Instead of resolving issues that need to be resolved, SMBs tend to get around to patching things as they have the time and manpower to do so. This is not the correct approach, as every day you wait to patch vulnerabilities on your system is another day that a hacker could exploit them.

Voyage Technology can make the patch implementation process easy. We can automatically or remotely deploy patches and security updates to your organization’s hardware and software solutions without an on-site visit. This makes our services so easy and convenient that you’ll never consider ignoring a patch or security warning again.

To learn more about our security services, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 02 August 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security Efficiency User Tips Hardware Internet IT Support Malware Privacy Google Email Computer Workplace Tips Phishing Hosted Solutions IT Services Users Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Small Business Cybersecurity Microsoft Backup Communication Passwords Data Backup Saving Money Smartphone Android Managed Service Business Management Smartphones VoIP communications Mobile Devices Upgrade Disaster Recovery Data Recovery Browser Social Media Productivity Windows Managed IT Services Microsoft Office Current Events AI Remote Tech Term Network Internet of Things Facebook Automation Artificial Intelligence Holiday Gadgets Cloud Computing Covid-19 Remote Work Training Miscellaneous Server Managed Service Provider Information Outsourced IT Employee/Employer Relationship Spam Compliance Encryption Windows 10 Office Business Continuity Government Data Management Wi-Fi Virtualization Business Technology IT Support Bandwidth Blockchain Windows 10 Vendor Two-factor Authentication Apps Mobile Office Data Security Employer-Employee Relationship Chrome Managed Services Budget Voice over Internet Protocol Apple Networking App Mobile Device Management Gmail BYOD Computing Applications Information Technology WiFi Access Control Office 365 Tip of the week Conferencing Hacker Avoiding Downtime How To Marketing BDR HIPAA Router Virtual Private Network Risk Management Big Data Health Help Desk Office Tips Analytics Augmented Reality Retail Computers Storage Password Healthcare Bring Your Own Device Managed IT Services Website Operating System Physical Security The Internet of Things Display Printer Social Paperless Office Windows 11 Infrastructure Monitoring 2FA Excel Document Management Customer Service Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Firewall Vulnerability End of Support Vendor Management Solutions Cybercrime VPN Employees YouTube Meetings Safety Integration Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays Data storage LiFi Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Customer Relationship Management Money Saving Time Virtual Machines Professional Services Humor Hacking Managed IT Service Presentation Maintenance Antivirus Sports Downloads Mouse iPhone Licensing Wireless Technology Entertainment Administration Vulnerabilities Data Privacy Images 101 Word Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Printing Wireless Content Filtering IT Management Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Undo Google Drive User Error Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsource IT Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Application Hotspot Transportation Small Businesses Tactics Development Windows 8 Laptop Websites Mirgation Hypervisor Displays IBM Drones Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Management PCI DSS Halloween Chatbots Navigation Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Competition Service Level Agreement Internet Service Provider Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Paperless Superfish Bookmark Identity Theft Smart Tech Memes Fun Co-managed IT Twitter Alerts SQL Server Technology Care Deep Learning Download Net Neutrality Financial Data Error History Business Communications User Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Scams Remote Computing Azure Hybrid Work Upload Procurement Mobile Computing Social Network Telework Cyber security IP Address Multi-Factor Security Tech Human Resources CES Tablet IoT Communitications Search Dark Web Cables Alert Best Practice Trends Supply Chain Management Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps Recovery Hard Drives Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Notifications Staff Value Business Intelligence Domains Business Growth Gamification Flexibility Organization Travel Social Networking Legislation Shortcuts Refrigeration Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Ransmoware Alt Codes Content Remote Working Wearable Technology Memory Vendors Public Speaking Health IT Downtime Unified Threat Management Motherboard Data Breach Lithium-ion battery Comparison Google Play Be Proactive Permissions Workforce Entrepreneur Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Threats

Blog Archive