Blog

Google Chrome Vulnerability (Actively Exploited Zero-Day Flaws)

Yesterday, September 30th, Google released an emergency update to fix two significant security vulnerabilities in the Google Chrome Internet browser.  If you use Chrome, or have Chrome installed, we strongly encourage you to verify Chrome is up to date with the most recent version.  One of the security vulnerabilities impacts Chrome even if you are ...

Read More

The Presidential Executive Order On Cybersecurity

The United States Federal Government has in recent years passed parts of key bills that relate to the Cybersecurity of this country.  But probably the most comprehensive one was just recently enacted by President Joe Biden, in the Executive Order that he signed on May 12th, 2021, primarily in response to all of the Ransomware ...

Read More

Microsoft Endpoint Manager

With COVID-19 and the mass migration to Work from Home (WFH) from the traditional office model, the focus on protecting company data in-transit and on both corporate and personal devices has increased.  The Zero Trust model of Security assumes every attempt to access information is a breach until the user proves who they are, and ...

Read More

An Overview Into The Azure Security Center

As a result of more people working from home, many businesses are now migrating their On-Premises IT/Network Infrastructures into the Cloud, namely Microsoft Azure.  While this does offer very significant advantages to a company, there can still be inherent security risks. To mitigate them, Microsoft has created a new platform known as the "Azure Security Center" ...

Read More

The Top Cybersecurity Predictions For 2021

It is hard to believe that we are about to roll into 2021. It genuinely has been a year that nobody ever dreamt of, including from the Cybersecurity standpoint. So, given all that has happened, what is predicted for next year? Here are some of what we believe will happen: Botnets will continue to grow ...

Read More

How Azure Protects Your Business

Business relies on IT systems and data for daily operation and even survival. Increasing threats from bad actors, physical infrastructure failure, data corruption, and human error persist in both the traditional datacenter and the cloud. Businesses strive to keep systems running, and plan for restoring services as quickly as possible when things inevitably fail. Any ...

Read More

Cybersecurity study reveals ‘misperceptions’ leave consumers vulnerable

Even as digital threats soar and public awareness about digital dangers increases, consumers seem to lack a clear understanding of how and where cybersecurity threats are evolving. According to a new study from Cujo AI, consumers have a wide range of misperceptions that could leave them vulnerable, even as they believe they are taking the ...

Read More

LNK sLoads Ramnit Trojans

Executive summary Microsoft security researchers discovered a campaign taking advantage of shortcut (LNK) files to load malware onto systems. The campaign used the shortcut files to call PowerShell commands in the sLoad malware framework. The commands then downloaded and installed the Ramnit banking trojan, which stole credentials, contacts, and other sensitive information. Both the sLoad ...

Read More

4 steps to secure your business this holiday season

Is Your Business Ready For More Clients–and More Risk? While the holiday season provides a boon to many small businesses, all that hustle and bustle can also give criminals an opportunity to prey on shoppers and business owners. But there are simple steps you can take to protect your business, not just during the holiday ...

Read More