PQS focuses on a defense in depth(layered) approach to securing our environments. Multiple layers of security controls (defense) are placed throughout an information technology (IT) system. Controls that mitigate the risk of exploitation of this vulnerabilities is as follows:
-Comprehensive Operating System, Application and Hardware patching policies and procedures that insure the breadth of our system both client and server side are patched according to vendor specifications and in a timely fashion. In this specific instance all applicable Intel and Microsoft patches have been applied.
-Endpoint AV/IDS as vendors develop signatures for these vulnerabilities we receive real-time updates to all of our systems to avoid exposure.
-ProSOC monitoring all of our audit logs for detection of abnormal behavior. ProSOC can monitor for the aliases vendors use for the detections as well as relevant details such as behaviour and file details.
-Continuous education of our end users including monthly and emergency level security education.
-Continuously monitoring for additional relevant software and hardware vendors affected by the vulnerabilities and apply necessary patches.
Below is a link to the alert for these vulnerabilities:
Please feel free to contact email@example.com with questions or concerns.