Vulnerability Scans: Only Part of the Equation

July 3, 2024

There are two primary ways we see companies manage vulnerabilities… one of them significantly riskier than the other.

 

Reactive strategies rely on a problem to arise before taking action. This makes reactive the riskier option of the two, hopefully for obvious reasons. Using a reactive strategy is like waiting for an electric bill to tell you that a door has been left open. By the time you get the memo, the damage has already been done.

 

On the other hand, proactive strategies actively seek potential weaknesses and do everything possible to run a secure program before a problem occurs. Closed door. Locks engaged. And maybe an alarm system to keep bad actors out.

 

We work with organizations who work very hard to be less vulnerable. In fact, they spend a lot of time and money trying to protect themselves from all kinds of threats.

 

So, how do you know which strategy you are currently engaging? And how do you make the shift to the less risky one?

 

  • Inventory: Establish a comprehensive, up-to-date list of all your software, its components, version numbers, and other key data points. Create processes and assign someone the responsibility of maintaining this list and hold them accountable to its accuracy. It’s hard to maintain security if these systems are not showing up on anyone’s radar.
  • Patching: Ensure your processes include patching and keeping all software up to date on a cadence separate from vulnerability scanning. Set up a regular patching schedule and stick to it. Patching isn’t just about remediating vulnerabilities; it’s about fixing bugs and unlocking new features in addition to critical updates.

 

  • Support: Keep an active relationship with your software representatives including established communication mechanisms to ensure you receive notifications of the latest updates. Clear communication with the source will help you ensure these valuable updates are known and made.

 

Ensuring these activities are part of your process will strengthen your cyber program and also help you sleep a little easier at night knowing you’re using best practices to run foundational parts of your security.

 

Let’s lock those doors before the burglars come knocking, shall we?

You May Like These Posts

Why Cybersecurity is as much Art as Science

In this kickoff episode of The Art of Cybersecurity, host Cheri Hotman shares why this podcast exists and what listeners can expect. Cyber isn’t just science or technology — it’s art. It’s messy, constrained, people-driven, and ultimately about mitigating risk to protect people and data. Cheri cuts through the noise of “easy button” tools, audit-passing […]

Bridging the Gap: Why Cybersecurity Tools Alone Aren’t Enough

Investing in the latest cybersecurity tools doesn’t automatically mean you’re secure. Many leaders feel the initial promise of a new solution—only to realize it’s not delivering the protection they expected. So, what’s missing? In this session, we’ll break down where the responsibility of the tool ends and where your team’s role begins. We’ll uncover why […]

The Difficulties of People Taking Ownership

So, you've got an amazing team of tech savvy folks who love the tech side of things.     They excel in implementing the latest tools and systems, but when it comes to the less glamorous side - like making sure tasks are completed and nobody drops the ball - things start to get a bit […]

Choosing the Right Cybersecurity Framework: A Practical Guide for Leaders

Speakers: Cheri Hotman and Tanya WadeHosted by: Hotman Group   Why Choosing the Right Framework Matters   Passing an audit is no longer enough. Many organizations still treat cybersecurity as a one-time project, something to "check off" rather than an integrated, living part of their business operations.   During this session, Cheri Hotman and Tanya […]

Security Awareness Training – Verizon 2025 Data Breach Investigations Report

In this 15-minute training, the HG team breaks down the most critical findings from Verizon’s 2025 Data Breach Investigations Report (DBIR)—and what they mean for real-world security programs. We cover the sharp rise in third-party breaches, the growing threat of GenAI misuse, and the continued dominance of ransomware and credential-based attacks. You’ll walk away with […]

Supply Chain Security: Managing Risk Beyond Your Vendors

When it comes to third-party supply chain security, there’s a big difference between doing it and doing it right. Every vendor you work with brings their own vendors into the mix—so who truly owns the risk? In this session, we’ll explore how to identify, assess, and mitigate supply chain risks at every level without overburdening […]

CMMC 101: What you need to know from framework to final rule

With a staggering loss of $3.5 billion in intellectual property through its contractors a year, the Department of Defense (DoD) needed a way to shore up cybersecurity in the Defense Industrial Base (DIB). From this need, the Cybersecurity Maturity Model Certification (CMMC) program was created with an initial release in 2020.   The entire purpose […]

Why Maturity Matters: Overcoming GRC Cognitive Overload with the Maturity Model

Please join Kayne McGladrey, author of the GRC Maturity Model and Cheri Hotman as they explore the GRC (Governance, Risk, and Compliance) Maturity Model, a powerful tool for organizations to assess and enhance their cybersecurity practices. Achieving maturity in GRC is crucial for navigating complex regulatory landscapes and boosting overall effectiveness. Through self-assessments, organizations can […]

Security Awareness Training – Social Engineering

Join us for an essential Security Awareness Training session focused on Social Engineering. In this session, we delve into the critical importance of cybersecurity awareness and how you, as an individual, serve as the first line of defense against cyber threats.   Key Topics Covered:   Why This Matters: Remember: Technology alone cannot protect you. […]

Post A Comment

Leave a Reply

Your email address will not be published.

{{brizy_dc_image_alt imageSrc=
Endless audits and customer demands were never supposed to replace real security.
We build, implement, and run Cyber GRC programs that reduce risk, protect the business, and still pass audits.

Hotman Group is a certified

woman-owned business (WOSB)

Hotman Group, LLC

Fort Worth, TX

Privacy Policy | Terms of Service | All Rights Reserved © Hotman Group, LLC