Security is the top technology concern among small business owners, and the flood of information about new security threats can seem overwhelming at times. Just about every week we see a new headline about a new threat or breach.
One of the most important actions to protect against threats is to keep your software up to date. In fact, the Massachusetts Data Security Law and other industry-specific compliance rules require up to date security updates: "For files containing personal information on a system that is connected to the Internet, there must be reasonably up-to-date firewall protection and operating system security patches..."
Every month, Microsoft releases new security updates on "Patch Tuesday" which is the second Tuesday of the month. These security updates are free with your licensed products, but they need to be installed to be effective. As you may know, you can turn on "automatic" updates with Microsoft, and get all the updates, but in many cases, blindly installing the updates can be a problem in a business environment and we don't recommend Automatic Updates. This is why our "best practice" is to test updates before installation and create a "patch policy" to manage installation. Just last week, Microsoft repealed security updates that were linked to blue-screened systems. The software is so complex, and occasionally a patch gets released that has unintended interactions. One of the most common is that many line-of-business applications won't run with the latest version of Internet Explorer, and a blind update will cause problems.
We get a lot of questions about this, and we thought it would be useful to explain the reasoning behind the generation of a patch policy. As a general rule, we'll install all Microsoft Operating System, Office, and other critical patches after testing. In general, critical patches will be tested within 24 hours, and lower priority patches will be tested within one to two weeks.
Sometimes customers look at the Automatic Updates information from Microsoft and become alarmed that they are not getting automatic updates, and the reason is that we test patches first. Our software monitors for patch compliance, and we are automatically notified when there is a problem and we can report back to users as needed. Each month, we review the list of installed patches and have a person on our team who specifically reviews sites every day for compliance.
Additional patches that are installed include Apple operating system patches (for MACs), and also "third party" patches such as Adobe Acrobat, Flash, Reader, Safari, Mozilla Firefox, Java, among others. As a general rule, we install hardware drivers on an as-needed basis as these are very specific to different systems and configurations.
The next most important feature of a patch strategy is to manage reboots. Many security patches require reboots for installation, and some patches are sequential in that the next patch can't install before the first installation is complete. For servers, we generally program a scheduled reboot after security patch installation at a scheduled time to minimize disruption to the office (generally in the midnight to 5am window). In a few cases, some line-of-business applications are known to not gracefully start after a reboot, and instead we schedule attended reboots so that the server and applications can be checked after the reboot. We'll call the office and schedule a specific time that works.
For desktops, we generally don't schedule forced reboots because of the potential disruption this can cause a user. If someone forgets to close an important document, or they're working at an odd time, a scheduled reboot can be annoying. Also, if a system is "asleep" during the scheduled time, the reboot will be attempted when the computer is "awake" again, and this can be annoying as well. We monitor reports of systems in need of reboot, and typically communicate with the office to let them know who needs a reboot. Also we ask all users to reboot at least weekly. In a few cases, we have scheduled site-wide reboot times, and if we see consistent problems with reboot compliance, we will strongly recommend this.
Data security is critical for protecting your business, and security updates are the first line of defense. Every month we get questions about security patches, and we hope this post has addressed some of your questions. Let us know!