IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
September 21st, 2018 | Jay Ferron | My information Resource
I don’t like writing breach stories because they occur far too often. On the other hand, when the breach is the fault of the sales merchant, one hopes exposure would cause a renewed interest in other merchants to better secure their retail websites to assure such data loss doesn’t - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Draft Cybersecurity Practice Guide SP 1800-14, Protecting the Integrity of Internet Routing: Border Gateway Protocol (BGP) Route Origin Validation, is Available for Comment It is difficult to overstate the importance of the internet to modern business and society in general. The internet is not a - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Here are a group of articles on Mitigating Ransomware Using the Rapid Cyberattack Assessment Tool, by Microsoft.Every Question Tells a Story – Mitigating Ransomware Using the Rapid Cyberattack Assessment Tool: Part 1 Link is here Every Question Tells a Story – Mitigating Ransomware - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Here is a link to a video on Deep dive on Windows Server 2019 updates..Link is here - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
During the 26th DEFCON conference this past week McAfee researchers showed how they have successfully been able to falsify patient vitals that are reported to the central monitoring stations. Two variations of the attack are possible due to weak communication protocols between client devices and - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Researchers Eyal Itkin and Yaniv Balmas revealed a new type of vulnerability at Defcon 2018 – one which attacks your fax machine. They call this new exploit ‘Faxploit’ and demonstrated how a victim’s network could be infiltrated by sending a malicious fax to a certain model - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
The Apple AppStore is considered and recommended to be the best way to get programs for your Mac. After all, Apple states that“The safest placeto download apps for your Mac is the Mac App Store. Apple reviews each app before it’s accepted by the store...”. But what if one of the - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
In the last few years the price of 3D printers fit for home use has fallen substantially. They have become cheap enough for people without advanced technical skills, especially security skills to venture into this market area. By default, most of the current 3D printers require being tethered to a - Read More
 
September 15th, 2018 | Jay Ferron | My information Resource
Announcing PowerShell Core 6.1We’re proud to announce that the latest version of PowerShell has been released! This marks our second supported release of PowerShell Core, the open-source edition of PowerShell that works on Linux, macOS, and Windows!By far, the biggest feature of this - Read More
 
August 6th, 2018 | Jay Ferron | My information Resource
The Spectre attack has been an unexpected danger to our security since January of this year. It’s an attack on most modern processors that use speculative execution to leak sensitive information to a potential attacker. Speculative execution allows processors to execute instructions in - Read More
 

Pages