{"id":89986,"date":"2019-10-09T09:00:59","date_gmt":"2019-10-09T16:00:59","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=89986"},"modified":"2023-05-15T23:07:47","modified_gmt":"2023-05-16T06:07:47","slug":"patching-social-responsibility","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/09\/patching-social-responsibility\/","title":{"rendered":"Patching as a social responsibility"},"content":{"rendered":"

In the wake of the devastating (Not)Petya attack, Microsoft set out to understand why some customers weren\u2019t applying cybersecurity hygiene, such as security patches, which would have helped mitigate this threat. We were particularly concerned with why patches hadn\u2019t been applied, as they had been available for months and had already been used in the WannaCrypt worm\u2014which clearly established a \u201dreal and present danger.”<\/p>\n

We learned a lot from this journey, including how important it is to build clearer industry guidance and standards on enterprise patch management. To help make it easier for organizations to plan, implement, and improve an enterprise patch management strategy, Microsoft is partnering with the U.S. National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE).<\/p>\n

NIST and Microsoft are extending an invitation for you to join this effort if you\u2019re a:<\/p>\n