The Importance of Inventory & Control of Software Assets to EMCs
In our last post, we covered Control One, Inventory & Control of Enterprise Assets. In this post, we are covering Control Two, The Importance of Inventory & Control of Software Assets. Besides clicking on a link in an email thereby inviting threat actors into your environment, what is another way to gain access to the data behind the firewalls? Unpatched software! Given today's cybersecurity climate, it is imperative for EMCs (and all organizations) to stay on top of updates, patches, and to perform regular vulnerability scans to test for known problems. When we turn on a computer or other network device, we expect it to power up and perform as it was designed. We want our lives without the worry of losing hundreds of thousands of dollars, maybe even millions, after finding out our entire network has been taken hostage and held for ransom! But that is what is happening…