• Cloud & Data Platform
  • Citrix
  • Article

Something never goes out of style and keeps its relevancy despite time passing by. Being patched up is never something we wish for, but in 2025 it is, however, a desired discipline when talking IT-security.

Unlike patchwork, which lost its popularity many years ago, then patching it hot, critical and a discipline not to be taken lightly 

An Overlooked Artform? 

"If you google patching in your search for solutions to keep your IT-environment secure, you might stumble upon numerous headlines like, The Art of Patch Management. Patching, in its simplest core, is about closing holes. To eliminate vulnerabilities in your It-infrastructure. A discipline which non-tech-people will know from their everyday-lives when phones insist on being updated, due to security breaches. Thus, it should be simple, straight-forward, and not an artform? Rather the contrary", says our expert on digital patchwork, Anders Wittendorff, Lead Architect in Danoffice IT. 

 

“The big problem is that we way too often see organizations who do not have control over their businesses. And without that control you do not have the required overview to be able to identify vulnerabilities, digital or not”, he says. Anders recently told Danish Business Daily, Børsen, that if do not have to time to keep your equipment secure, then you should turn it off.  

Anders Wittendorff Lead Architect, Danoffice IT

 

“We, unfortunately, must realize that even after all these years with digital threats, then we are still not good enough at eliminating vulnerabilities and closing holes in out IT-infrastructure”. But according to Anders there is a missing link making patch management an actual artform. “One thing is to patch. Another is to create visibility. These are interconnected disciplines and require the right strategy – and access to solid consulting”, he states.  

Scanning, Interpretation and Consulting 

Being a Citrix-expert of many years, Anders often meet companies which are feeling lost and who need advice. “Many Citrix clients come to us when they get new security guides, either from Citrix directly or from third parties, and they ask us for our help on specific vulnerabilities”, he says. “One critical issue in one specific feature can create panic for some, while it can be ignored by others. It can be very hard for an individual company to interpretate, so here we are giving advice and counselling”.  

 

Access to insights and help is therefore crucial, Anders says. “We always recommend that you initiate vulnerability scans at least twice a year, and preferably even more often. Also, it is recommended to automize these, if possible. That way you will detect compromised equipment. Then you can reach out to us for advice for acting on the scan results, and together we will find the right equipment and solutions”.  

Business professional using a laptop with digital security icons, representing data protection and vulnerability management

Patch Management as an Artform?

1.  Organize your overview and initiate frequent                             vulnerability scans

 

2.  Create alliances and strategic partnerships to get your        scan analyzed

 

3.  Identity the right solutions and equipment to                          eliminate vulnerabilities

 

4.  Test and implement

 

5.  Do it all again at the next scan 

Legacy and Shadow 

“In large it is legacy and shadow IT that create the vulnerabilities. We often see that it is equipment, you thought was shut down, which is left un-updated. For example, a terminal in the corner of the production-line, which used to be assigned to specialized tasks and runs on old systems”, Ander says and continues: “Another big problem is when the users act on their own and establish shadow IT, meaning unauthorized solutions. This can be apps, subscriptions or other elements which get access to our environments. It should not be possible to create things which go under the radar, but reality tells us that it is – and to most companies this is an actual issue. This goes for both legacy and shadow IT”.  

Isolate the Problem 

Like many other things in IT, working with legacy IT is not easy. “In many cases you cannot just shut down old systems or terminals. We often see this in OT and production, but also in health care and hospitals”, Anders says and underlines that action must be made. “If you are in a situation where you cannot shut down a vulnerable device – and it cannot even be patched – then you have to isolate it”. Thus, the process and scope shifts since you now have to analyze how the device is connected.

 

“We need to secure the way the device is accessed from the outside, since this is often required that these it is. But to do that we need to know what the device is connected to – who it is talking to”. Modern solutions like closed networks, access control and disconnected cloud can make a difference here. “This just shows how critical visibility is – and how it influences the vulnerabilities we identify”.  

Computer screen displaying code editor with AI actions menu highlighting Find Problems option

Log On! 

With regards to visibility, Anders says that a lot of the attacks, we see today, are not registered right away. “The hackers often get access and are in the system a long time before the actual attack is carried through. If you do not log your data and have logs on all traffic then you cannot know how and when they have accessed the system”, he says and adds: “We often see that when vulnerabilities have been detected, and something has not been patched, then you do not have any logs either. All this requires overview, and in that context, logs are critical”.  

Keep the Radar On 

“All IT-systems, large or small, must be updated. They must be patched. Every small hole is a vulnerability. It is an open door, and today we have reached a point where, if you do not have the time to act on vulnerabilities, then you have to shut down your equipment – and reach out for help. The consequences are, simply, too big”. The blue ocean of knowledge on IT security can be overwhelming, but according to Anders, there is no way around it. “It is important to stay alert and to keep the radar on. Seek insights on the characteristics of current attacks and prioritize your efforts. In the year 2025, patching requires overview, partnerships, and having your preparedness organized”, concludes Anders Wittendorff, Lead Architect in Danoffice IT.  

Menu root is null.

Read More