There is a lot of attention being paid to continuously updating servers to patch security vulnerabilities on Linux servers running in data centers - a basic step underpinning technology infrastructure in every industry
"Yet, staff resources to deal with maintaining servers are not sufficient to meet the workload, said 55% of respondents in a worldwide survey by CloudLinux.
Dealing with insufficient staff resources with automation
The survey finds 76% are deploying automated patching procedures and that live patching to fix vulnerabilities is commonly used (47%) to avoid downtime that is normally associated with patching. This is not surprising given the volume of vulnerabilities that are discovered and patched every week. There are simply too many patches to apply to do so manually and IT professionals are using automated tools to help keep up with the volume..."
Axelos, IDCA and the Uptime Institute each offer training courses and certifications for data center admins to increase their knowledge of common data center standards
"Data center standard training for IT admins can help data center professionals better understand and apply IT industry standards. Admins can also use the credentials from this sort of training to demonstrate a specific level of expertise on a subject to peers and employers
Data center professionals looking to add to their credentials should consider options from IT standards organizations. Axelos, the International Data Center Authority (IDCA) and the Uptime Institute each offer training and information on different aspects of data center service management, including design, operations or risk management..."
Is it smarter to ignore a possibly buggy patch or take arms against a sea of hackers?
"Security is more important than ever-and ransomware is bigger and badder than ever. Barely a week goes by without a major new ransomware attack.
One way you can slow down, if not stop, such attacks is by keeping your mission-critical applications and operating systems up to date. There's only one little problem with that. Those patches, especially Microsoft's Windows patches, can be more trouble than they're worth. What's a business to do?
Take, for example, PrintNightmare. These security holes in the Windows Print Spooler service are large enough to throw a 71-pound, first-generation HP printer through. A variety of attacks are now out there, allowing compromise of not just your Windows 7 and 10 PCs, but your Windows servers as well. Is this a great bug or what?..."