IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
January 17th, 2020 | Jay Ferron | My information Resource
    A popular app allowing parents to track their baby’s special moments by storing videos, pictures, height, weight, location, and other milestones in a child’s development has leaked thousands of those special moments online. Peekaboo Moments, developed by Bithouse Inc - Read More
 
January 10th, 2020 | Jay Ferron | My information Resource
    In the first three quarters of 2019, the world saw nearly 152 million ransom-ware attacks affecting every sector from government to education to healthcare. As the threat continues to grow, it costs businesses over $75 million per year. One cybersecurity group estimated a new - Read More
 
January 10th, 2020 | Jay Ferron | My information Resource
    WhatsApp is a Facebook owned messaging system popular for their end-to-end encryption and groups that are capable of including up to 256 members. A shared communication tool is critical to have while coordinating amongst friends and participants of collaborative efforts. When one - Read More
 
December 20th, 2019 | Jay Ferron | My information Resource
    In the world of IoT home cameras, Ring cameras by Amazon are most popular. There can be many benefits of using the cameras for monitoring or as a security device, but it’s been a bad few weeks for the Ring camera. We now have reports of a hacker taunting a child in - Read More
 
December 12th, 2019 | Jay Ferron | My information Resource
    Malicious apps are bad enough, but what if you have one on your phone that looks just like an app you use everyday? As it turns out, researchers from the Norwegian application security firm Promon discovered an Android vulnerability that does just that.      - Read More
 
December 12th, 2019 | Jay Ferron | My information Resource
A virtual private network (VPN) is supposed to keep the user's traffic over a network safe from outside onlookers. They act as a protected path for communication over a public network to gain access to the resources and capabilities of the private network without a physical connection. Researchers - Read More
 
December 12th, 2019 | Jay Ferron | My information Resource
    Smart TVs have become extremely common in the last few years; it is even difficult to buy a new TV without smart functionality. Having Netflix streaming built into your TV can be convenient, but connecting your TV to the internet might not be the best idea. The FBI issued a - Read More
 
December 12th, 2019 | Jay Ferron | My information Resource
NIST invites comments on Draft NIST Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. All of the digital signature schemes specified in Federal Information Processing Standards Publication (FIPS) 186-4 will be broken if large-scale quantum computers are - Read More
 
December 3rd, 2019 | Jay Ferron | My information Resource
Trend Micro report thisBehavior analysisCallerSpy claims it’s a chat app, but we found that it had no chat features at all and it was riddled with espionage behaviors. When launched, CallerSpy initiates a connection with the C&C server via Socket.IO to monitor upcoming commands. It then - Read More
 
December 1st, 2019 | Jay Ferron | My information Resource
National Cyber Awareness System:Caller Poses as CISA Rep in Extortion Scam Original release date: November 29, 2019The Cybersecurity and Infrastructure Security Agency (CISA) is aware of a phone scam where a caller pretends to be a CISA representative. The scammer claims to have knowledge of - Read More
 

Pages