Rhysida ransomware actors have been known to exploit the Zerologon vulnerability (CVE-2020-1472) in Microsoft’s Netlogon Remote Protocol and use phishing attacks to infiltrate and persist within a network. The ease of exploitation involved with this vulnerability - a simple request to a specific vulnerable protocol - underscores the importance of automatic patching. At many organizations, especially larger ones, upgrading software is a manual and time-consuming process. Each upgrade carries a certain amount of risk, as the change set may be incompatible with other critical applications on the system. However, it is possible to establish a process of safe automated patching - and setting one up should be a top priority.