07/03/2024
One of the habits I've recommended is to do a weekly recurring update of applications used, whether the operating system, browsers, and applications (mobile, laptop, computer, function-specific devices like routers, access points, smart devices, etc.)
Assuming we are breached, apply the Zero Trust model, where it doesn't matter whether the software or devices are inside or outside our managed systems. Everything needs to be inventoried, assessed, monitored, and updated accordingly. Always verify, oversee, monitor, and respond accordingly to events, anomalies, and incidents by priority and impact.
Reduce your vulnerability by updating with latest security fix(s) and stable software update(s).