Sicra Header Logo
  • Careers
  • About us
  • People
EnglishNorsk
Talk to us
  1. Knowledge
  2. Insights
  3. Blog
Blog
10.11.2025
min read

Three days to attack: Why vulnerabilities must be closed faster

When vulnerabilities are exploited in less than three days, slow response is no longer just an IT issue, it is a leadership issue. Rapid handling of security vulnerabilities is now part of risk management and essential to maintaining trust with customers and partners. 
<span id="hs_cos_wrapper_name" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="text" >Three days to attack: Why vulnerabilities must be closed faster</span>
Sicra_Portrait_Crop_1200x1500px_4808
Oddbjørn SkaugeChief Information Security Officer
Proactive CISO who focuses on good and simple solutions for information security.

Attacks start before organizations have time to react 

Attackers now exploit new vulnerabilities just 72 hours after they become publicly known. Many organizations, however, take weeks or even months before updates are actually installed. This delay creates a dangerous window of exposure, and it is here that many IT operations providers fail. 

A race against the clock 

The term Time to Exploit (TTE) describes how long it takes from when a vulnerability is disclosed until it is actively used in attacks. Today, the average is around three days. This means attackers often have working exploit code ready before an organization has even tested a security update. 

According to Rapid7’s Attack Intelligence Report 2024, more than 35 percent of all attacks start with known but unpatched vulnerabilities. 

Why does it go so wrong? 

There are several reasons why many organizations fall behind. First, cybercriminals use increasingly advanced tools that automatically scan the internet for systems with known weaknesses. At the same time, many organizations have complex IT environments, often with multiple service providers, diverse technologies, and poor visibility into what is actually exposed. 

Another challenge is slow patch routines. Many IT departments still follow quarterly update cycles, while attackers work continuously. In addition, several service providers offer security updates as an optional service add-on rather than including it as a part of their standard contract offering. The result is that many systems remain open long after a vulnerability has been identified. 

When quarterly patching is no longer enough 

Traditional, scheduled updates can no longer keep up. When vulnerabilities are exploited within three days, organizations must be able to respond within hours or days, not weeks. This is not just about IT, but about preparedness, trust, and organizational reputation. 

Stricter requirements in law and frameworks 

The new Digital Security Act, which came into force on October 1, 2025, sets clear requirements for responsibility, governance, and risk management in digital services, both in the public and private sectors. The law places special emphasis on rapid vulnerability management and documented security management. 

Norway’s National Security Authority (NSM) also highlights the importance of swift responses in its Fundamental Principles for ICT Security. The principles identify, protect, detect, respond, and recover form the foundation of robust security work. Organizations following these principles  will significantly reduce their risk. 

The first 72 hours matter 

When a new vulnerability becomes known, management must act quickly. The first step is to gain an overview: Are our systems affected? Then comes prioritization. If the vulnerability appears on an international Known Exploited Vulnerabilities list, it should be treated as critical. 

If updates cannot be installed immediately, the organization must implement temporary measures. This can include isolating systems, blocking traffic, disabling unnecessary services, and enforcing multi-factor authentication. In parallel, updates should be planned and executed as quickly as possible, ideally within 72 hours. 

From hindsight to action 

Many organizations still lack a comprehensive system for managing vulnerabilities. Instead of reacting haphazardly, they should adopt Risk-Based Vulnerability Management (RBVM). This approach evaluates not only how severe a weakness is, but also how critical the affected system is to the business, and whether the vulnerability is actually being exploited in the wild. 

The goal is to reduce the time from detection to remediation, often referred to as Mean Time to Remediate (MTTR), to under 72 hours for critical vulnerabilities. 

Service providers must step up 

For many organizations, the responsibility for updating lies with their service providers. But when one provider manages the Windows environment, another the cloud platform, and a third the applications, responsibility and accountability quickly becomes blurred and progress slows. 

That is why business leaders should set clear requirements in contracts and agreements. Security updates should not be optional but an integral part of the service. Providers should have contractual obligations (SLAs) for handling critical flaws and must report regularly on patch status and vulnerabilities. 

Toward a more resilient organization 

In the long term, this is about building resilience. That means automating updates so they happen continuously, segmenting the network so attacks do not spread, and conducting exercises to test whether implemented measures actually work. 

Security must also be anchored as a leadership responsibility, not just an IT issue. Organizations that move their services to modern platforms supporting frequent and secure updates will be far better prepared to face the threats of the future. 

Need Assistance?

We are happy to have a non-binding conversation. 
Contact us

Explore more

Secure and user-friendly multi-factor authentication (MFA) is possible
Blog

Secure and user-friendly multi-factor authentication (MFA) is possible

Tech blog
Cybersecurity
Microsoft
How to achieve both secure and user-friendly multi-factor authentication.
Considering a Security Operations Center (SOC)? Here’s how to get the most for your money
Blog

Considering a Security Operations Center (SOC)? Here’s how to get the most for your money

How to achieve security, rapid response, and financial balance with Sicra SOC.
How technology support can empower employees against digital threats
Blog

How technology support can empower employees against digital threats

Cybersecurity
CISO
Technology empowers employees to act securely against digital threats.
Norwegians and digital security culture 2025: When private habits become corporate risk
Blog

Norwegians and digital security culture 2025: When private habits become corporate risk

Private digital behavior shapes the security culture at work.

Stay updated
Receive the latest news

Links
SustainabilityFAQPartnersCertifications and awardsCareerPress & brand
Contact
Tel: +47 648 08 488
E-mail: firmapost@sicra.no
Posthuset, Biskop Gunnerus’ gate 14A, 0185 Oslo, Norway
Follow us on LinkedIn
Certifications
iso27001-white
ISO 27001 compliance
miljofyrtarnlogo-hvit-rgb
Eco-Lighthouse
Sicra Footer Logo
Sicra © 2025
Privacy Policy