Fred Cobb – CISO and VP of Services, InfoSystems
Garrett Boyd – vCIO and Security Engineer, InfoSystems
In this episode, Fred and Garrett discuss the recent Mozilla Firefox Vulnerability Patches that were issued. These vulnerabilities have been found to allow cyber criminals to install programs, manipulate data, and create new accounts with full user rights under your account(s). Anyone currently using Mozilla Firefox versions prior to 77.0 should take immediate action.
Many companies don't consider their vulnerability with third party and regularly used applications. But these can be exploited just as easily as more commonly known avenues of attack. For this reason, it's important that companies put an emphasis on patching all applications regularly.There's a number of tools available in the market to assist you in automatic patching. Some of which include:
- Patch Manager
- Connectwise Automate (third party patch management)
Another step you can take is to create a list of approved software that are allowed to run on your system(s). Creating a baseline of what's authorized in your environment helps you control what's installed. And scanning that list and your systems regularly will help you catch anything that has been installed but shouldn't be.
Listen to the full episode to learn more about the Mozilla Firefox vulnerabilities and the security measures you can take to make updating and patching your applications easier.More Information
We'd love to hear your feedback. If you have any questions, you can text us at 423-697-9528 or email firstname.lastname@example.org. Update your version of Mozilla Firefox here.
Learn more about the Mozilla Firefox Vulnerabilities and Patching here.