- Cloud & Data Platform
- Citrix
- Article
Something never goes out of style and keeps its relevancy despite time passing by. Being patched up is never something we wish for, but in 2025 it is, however, a desired discipline when talking IT-security.
Unlike patchwork, which lost its popularity many years ago, then patching it hot, critical and a discipline not to be taken lightly.
“We, unfortunately, must realize that even after all these years with digital threats, then we are still not good enough at eliminating vulnerabilities and closing holes in out IT-infrastructure”. But according to Anders there is a missing link making patch management an actual artform. “One thing is to patch. Another is to create visibility. These are interconnected disciplines and require the right strategy – and access to solid consulting”, he states.
Scanning, Interpretation and Consulting
Being a Citrix-expert of many years, Anders often meet companies which are feeling lost and who need advice. “Many Citrix clients come to us when they get new security guides, either from Citrix directly or from third parties, and they ask us for our help on specific vulnerabilities”, he says. “One critical issue in one specific feature can create panic for some, while it can be ignored by others. It can be very hard for an individual company to interpretate, so here we are giving advice and counselling”.
Access to insights and help is therefore crucial, Anders says. “We always recommend that you initiate vulnerability scans at least twice a year, and preferably even more often. Also, it is recommended to automize these, if possible. That way you will detect compromised equipment. Then you can reach out to us for advice for acting on the scan results, and together we will find the right equipment and solutions”.
Legacy and Shadow
“In large it is legacy and shadow IT that create the vulnerabilities. We often see that it is equipment, you thought was shut down, which is left un-updated. For example, a terminal in the corner of the production-line, which used to be assigned to specialized tasks and runs on old systems”, Ander says and continues: “Another big problem is when the users act on their own and establish shadow IT, meaning unauthorized solutions. This can be apps, subscriptions or other elements which get access to our environments. It should not be possible to create things which go under the radar, but reality tells us that it is – and to most companies this is an actual issue. This goes for both legacy and shadow IT”.
Log On!
With regards to visibility, Anders says that a lot of the attacks, we see today, are not registered right away. “The hackers often get access and are in the system a long time before the actual attack is carried through. If you do not log your data and have logs on all traffic then you cannot know how and when they have accessed the system”, he says and adds: “We often see that when vulnerabilities have been detected, and something has not been patched, then you do not have any logs either. All this requires overview, and in that context, logs are critical”.
Keep the Radar On
“All IT-systems, large or small, must be updated. They must be patched. Every small hole is a vulnerability. It is an open door, and today we have reached a point where, if you do not have the time to act on vulnerabilities, then you have to shut down your equipment – and reach out for help. The consequences are, simply, too big”. The blue ocean of knowledge on IT security can be overwhelming, but according to Anders, there is no way around it. “It is important to stay alert and to keep the radar on. Seek insights on the characteristics of current attacks and prioritize your efforts. In the year 2025, patching requires overview, partnerships, and having your preparedness organized”, concludes Anders Wittendorff, Lead Architect in Danoffice IT.