Mon – Fri  9AM – 5PM|Client Portal
ITstuffed
Cybersecurity

The Software Vulnerabilities Hackers Are Actively Exploiting Right Now

Your practice manager arrives at 9am, opens her laptop, and gets on with the day. She has no idea that the version of Adobe Acrobat on her machine has a known flaw that lets an attacker run malicious code through a PDF attachment. Neither does anyone else in the office. The patch has been available for months. Nobody installed it.

This is how most small business breaches happen. Not through sophisticated espionage, but through known, fixable gaps that never got closed. Researchers estimate that the vast majority of successful cyberattacks exploit vulnerabilities that already had patches available at the time of the attack. The door was unlocked. The lock just hadn't been turned.

Software vulnerabilities are a permanent feature of running a business on technology. Every time a developer releases an update, security researchers and attackers alike comb through it looking for weaknesses. When a weakness is found, the developer issues a fix. But between the moment a flaw is discovered and the moment it gets patched on your machines, your business is exposed. The problem is compounded when old software - things like Adobe Flash Player or Internet Explorer - gets left on machines long after the vendor stopped supporting it. There are no more patches coming for those. Any machine still running them has permanent, unfixable holes.

The specific vulnerabilities making the rounds right now affect products most businesses use every day. Microsoft Office, Google Chrome, Adobe Acrobat Reader, and common network equipment from brands like Cisco and Netgear all have known flaws being actively targeted. Some of these flaws allow attackers to run code on a machine remotely, without the user doing anything beyond opening a file or visiting a compromised website. Others allow a phishing email attachment to give an attacker full control of a device. A few affect the routers that sit at the edge of your network - the devices that connect everything in your office to the internet.

When these gaps are closed promptly, the risk drops sharply. A practice running properly managed IT support has patches applied as they are released, across every device on the network. End-of-life software gets removed before it becomes a liability. Network equipment gets firmware updates on a schedule, not when someone remembers. The result is not a perfect system - no system is - but it removes the easiest targets that attackers go after first. Most attackers are not sophisticated. They scan for known weaknesses and move on if they don't find an easy way in.

For a healthcare practice or law firm handling sensitive client information, this matters beyond the operational disruption of a breach. The NZ Privacy Act 2020 requires businesses to take reasonable steps to protect personal information. A breach caused by a patch that was available but never applied is difficult to defend. The Office of the Privacy Commissioner takes a dim view of preventable incidents, and the reputational cost with clients is worse than any regulatory response.

The practical answer here is not to become an IT expert. It is to make sure someone with that expertise is actively managing your systems. Patch management, update scheduling, and removing legacy software are not glamorous tasks, but they are the backbone of keeping a business safe. If you are not sure whether your current setup handles this properly, that is worth finding out. Managed IT support for professional services businesses covers exactly this kind of ongoing maintenance, not just fixing things when they break.

ITstuffed works with professional services businesses across Canterbury. If you want a quick sense of where your setup stands, book a 15-minute IT Fit Check and we can take a look.