Eighty-five percent of organizations have not regularly patched operational technology systems, with most only applying remediations quarterly at most, even though more than a third of OT cybersecurity incidents stemmed from software flaw abuse, according to SecurityWeek.Inadequate personnel or expertise, operational disruption concerns, and lacking vendor support or patch testing were cited by surveyed C-level executives in North America, Europe, the Middle East, and Asia as the primary hindrances to regular OT patching, a report from TXOne Networks showed.Operational interruption worries have prompted almost 60% to implement patches during scheduled downtimes, which TXOne noted could be difficult for high-efficiency entities.Additional findings revealed that patch prioritization was mainly based on the importance of affected systems, fix availability, and flaw criticality, while severity scores, Exploit Prediction Scoring System, and Time-to-Exploit estimates have been leveraged to categorize vulnerabilities. Meanwhile, enhanced monitoring and threat detection systems were only leveraged by over 50% of organizations in the absence of software fixes, noted researchers, who recommended the adoption of virtual patching, automation tools, and collaborative patch management to better defend OT systems.
OT Security, Patch/Configuration Management, Vulnerability Management
Report: Suboptimal OT patching practices prevail

Credit: Adobe Stock Images
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds