WELCOME TO THE CONTINUITY CENTRAL ARCHIVE SITE

Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

Research highlights the risks that organizations are taking with Java

New research published by Bit9 reports that Java represents a significant security risk to enterprises because it is the endpoint technology most targeted by cyber attacks.

The Bit9 threat research team analysed Java deployment statistics on approximately one million endpoints at hundreds of enterprises worldwide.

The resulting report ‘Java Vulnerabilities: Write Once, Pwn Anywhere’, identifies significant risks posed by outdated versions of Java with many known vulnerabilities that remain widely deployed by many businesses.

Highlights of the report include:

  • The average organization has more than 50 versions of Java installed across all of its endpoints.
  • Five percent of those enterprises have more than 100 versions of Java installed.
  • Most endpoints have multiple versions of Java installed, in part because the Java installation and update process often does not remove old versions.
  • Attackers can determine what versions of Java an enterprise is running and target the oldest, most vulnerable versions.
  • The most popular version of Java running on endpoints analysed by Bit9 is version 6 update 20, which is present on 9 percent of all systems and has 96 known vulnerabilities of the highest severity.
  • Less than 1 percent of enterprises are running the latest version of Java.

“For the past 15 years or so, IT administrators have been under the misperception that updating Java would address its security issues,” said Harry Sverdlove, Bit9 chief technology officer. “They have been told that to improve security, they should continuously and aggressively deploy Java updates on all of their endpoints. Unfortunately, updating is not the same as upgrading. Until very recently, those updates have failed to deliver the promised security upgrade because they have not removed older, highly vulnerable versions of Java they were intended to replace. As a result, most organizations have multiple versions of Java on their endpoints, including some that were released at the same time as Windows 95,” said Sverdlove.

Java Vulnerabilities: Write Once, Pwn Anywhere recommends that enterprises concerned about the security risks in older versions of Java should:

  • Assess how many versions of Java are running in the enterprise;
  • Decide if these older versions are needed for valid business reasons and if Java should be running in browsers;
  • Enforce those decisions with a comprehensive security solution.

“It’s not surprising that most companies are unaware of all the versions of Java on their systems,” said Sverdlove. “Most organizations have no idea what’s running on their endpoints and servers—they lack visibility into those systems. And traditional security solutions — including antivirus — can’t protect them from modern threats.”

https://www.bit9.com/

•Date: 23rd July 2013 • World •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.
   

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here