Please join us on June 7th for a very special webinar. This month we will be talking about how the Ukraine situation affects the cybersecurity landscape for the US and what it means for network security. Leading this discussion will be Jason Whitehurst, a cybersecurity professional of over 20+ years, and Vince Crisler, former White […]
I wanted to update you on the Microsoft authentication issues caused by the May patches. This only potentially affects Microsoft Domain Controllers. More specifically it only affects Domain Controllers that are using certificates in any way for some form of authentication.
Recently I wrote about the increasing vulnerabilities in BIOS/UEFI underneath the operating system and encouraging you to update your devices to current BIOS levels. We have been notified of a vulnerability in select HPE BIOS. If you have HPE endpoints, please read the attached notice.
Quest has notified us that they have a critical vulnerability. If you use a KACE appliance, please read this information and perform their recommended mitigation steps. Kace Critical Vulnerability -Scott Quimby
“Legends state that Achilles was invulnerable in all of his body except for one heel because when his mother Thetis dipped him in the River Styx as an infant, she held him by one of his heels. Alluding to these legends, the term “Achilles’ heel” has come to mean a point of weakness, especially in […]
Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most common cybersecurity endpoint protection platforms. Why does this matter? The 2022 assessment and results are particularly interesting because the payload they used is the most common, and nefarious, ransomware and malware variants in use today.
Please click on the link to hear Scott’s thoughts on why this topic is so vital for you to understand. Please join us on May 6th as Jason Whitehurst, Cybersecurity Professional, will take us through the Mitre Engenuity 2022 evaluation results. Mitre Engenuity has released its 2022 fully independent evaluation of 30 of the most […]
“When it absolutely, positively has to be there overnight” – FedEx As many of you know, Bob and I have been doing this for a while – 41 years in fact. And through all those years, every day is new and fun. Thanks for your support and friendship and trust through all those years.
Last time I talked about making email safer. I focused on inbound email to your users and outbound encrypted emails. However, I neglected to say that advanced spam filters also work outbound. That means that your end-users email and attachments will be scanned to protect against an inadvertent sending out of malicious content.
Last week I talked about the importance of Cloud Backup in our new remote teaching and learning and back-office school environments. This week I am going to talk about secure and reliable communications. The reality is that the number one threat to your network is your users clicking on attachments or web links that lead […]
Recent Comments