we have to develop a new methodology to patch everything. Test first make sure it works, then implement to all systems.
It is imperative to do this, since the system that is the weak point will get attacked (Murphy’s law) and now the criminal hackers are in your network and the game has changed – another reason to have zero trust architecture (we have discussed this before).