Patch Management: Protect Against Zero-Days
Unpatched software is the number one entry point for attackers. Yet most SMEs struggle with patching—too many updates, not enough time, fear of breaking things. Here's how to build a practical patch management process that actually works.
Why Patching Matters
Every unpatched system is an open door for attackers:
What is a Zero-Day?
A zero-day vulnerability is a security flaw that's being actively exploited before a patch exists. The name comes from the fact that defenders have "zero days" to prepare.
Zero-day vulnerability
A flaw in software that the vendor doesn't know about yet, or knows about but hasn't fixed.
Zero-day exploit
Attack code that takes advantage of a zero-day vulnerability. Often sold on dark markets.
Zero-day attack
An actual attack using a zero-day exploit against real targets.
Recent Zero-Day Examples
MOVEit (2023-2025)
Clop ransomware group exploited zero-days in MOVEit file transfer software, affecting hundreds of organizations before patches were available.
Citrix Bleed (2023)
Critical vulnerability in Citrix NetScaler allowing session hijacking. Exploited within days of discovery.
Oracle WebLogic (2025)
Clop exploited zero-day in Oracle software for widespread data theft campaigns.
Building Your Patch Management Process
A practical approach that works for SMEs without dedicated security teams:
Step 1: Know What You Have
You can't patch what you don't know about. Create an inventory of:
- Operating systems (Windows, macOS, Linux) and versions
- Server software (web servers, databases, email)
- Business applications (ERP, CRM, accounting)
- Network devices (routers, firewalls, switches)
- Cloud services and SaaS applications
- Third-party libraries and dependencies
Step 2: Subscribe to Security Alerts
Stay informed about vulnerabilities affecting your software:
- Microsoft Security Update Guide for Windows/Office
- Vendor security bulletins (check each vendor's security page)
- CERT.be alerts for Belgian organizations
- US-CERT/CISA alerts for critical vulnerabilities
- Industry-specific ISACs if applicable
Step 3: Prioritize by Risk
Not all patches are equally urgent. Use this framework:
- Critical: Active exploitation or internet-facing systems. Patch within 48 hours.
- High: No known exploitation but severe impact. Patch within 7 days.
- Medium: Limited impact or requires authentication. Patch within 30 days.
- Low: Minimal impact. Include in regular maintenance cycle.
Step 4: Test Before Deploying
Patches can break things. Reduce risk with testing:
- For critical business systems, test on a non-production copy first
- For workstations, deploy to a pilot group before company-wide rollout
- Have a rollback plan if something goes wrong
- Document any issues for future reference
Step 5: Automate Where Possible
Manual patching doesn't scale. Automate the routine:
- Enable Windows Update for automatic security patches
- Enable auto-updates for browsers (Chrome, Firefox, Edge)
- Use managed update services for servers (WSUS, Intune)
- Enable auto-updates for cloud/SaaS applications
- Consider patch management tools for larger environments
Step 6: Track and Verify
Ensure patches are actually applied:
- Check patch status in Windows Update or management console
- Verify critical patches with vulnerability scanners
- Keep records for compliance audits
- Follow up on failed patches
- Review patch compliance monthly
Responding to Zero-Day Announcements
When a zero-day affecting your software is announced, act quickly:
Assess exposure
Do you have the affected software? What version? How many systems? Are they internet-facing?
Apply workarounds
Vendors often release workarounds before patches. Disable affected features, restrict access, or isolate systems.
Monitor for attacks
Check logs for signs of exploitation. Look for indicators of compromise (IOCs) if published.
Patch immediately
When the patch is released, apply it to exposed systems within 24-48 hours. Don't wait for testing.
Verify remediation
Confirm patches applied successfully. Re-scan for vulnerabilities. Check for signs of prior compromise.
Common Patching Challenges
"We can't patch—it might break something"
Solution: The risk of not patching is almost always higher. Test where possible, but prioritize security. Most patches don't cause issues.
"Our vendor says we can't update"
Solution: If a vendor doesn't support security updates, that's a major risk. Isolate the system, compensate with other controls, and plan to replace it.
"We don't have time to patch everything"
Solution: Focus on internet-facing systems and critical assets first. Automate routine patching. Accept some risk for low-priority systems.
"Patches come too frequently"
Solution: This is normal—software is complex. Automate what you can, prioritize the rest. A weekly patch review takes less time than incident response.
"Our legacy systems can't be patched"
Solution: Isolate them from the network, disable unnecessary services, implement additional monitoring, and plan for replacement.
Patch Management Tools for SMEs
You don't need enterprise tools to patch effectively:
| Tool | Description | Cost |
|---|---|---|
| Windows Update / WSUS | Built-in Windows tools. WSUS gives more control for businesses. | Free |
| Microsoft Intune | Cloud-based management for Windows, macOS, mobile. Part of Microsoft 365 Business Premium. | Included in M365 |
| NinjaRMM / Datto RMM | MSP-focused tools also work for SMEs wanting more control. | Per device/month |
| Vulners / OpenVAS | Vulnerability scanners to verify patches are applied. | Free / Open source |
How Easy Cyber Protection Helps
Frequently Asked Questions
How quickly should we apply security patches?
Critical patches (actively exploited or internet-facing): 24-48 hours. High severity: 7 days. Medium: 30 days. Low: next maintenance window. For zero-days being actively exploited, patch immediately—the risk of not patching exceeds any testing concerns.
What if a patch breaks our system?
This is rare but happens. Have a rollback plan (system restore point, backup, snapshot). For critical systems, test patches in a staging environment first. If a patch does cause issues, most vendors release fixes quickly. The risk of not patching usually exceeds the risk of a bad patch.
Do we need to patch everything?
Prioritize: internet-facing systems, systems with sensitive data, and critical business applications. Internal-only systems with no sensitive data are lower priority. But don't ignore them—attackers move laterally once inside.
What about third-party software?
Third-party apps (Adobe, Java, browsers) are frequently exploited. Enable auto-updates where possible. For business software, subscribe to vendor security bulletins. Include third-party software in your inventory.
Is patching enough for security?
Patching is essential but not sufficient. You also need access controls, endpoint protection, backups, employee training, and incident response plans. Think of patching as closing known holes—you still need other defenses for unknown threats.