IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
June 13th, 2020 | Jay Ferron | My information Resource
    NIST is issuing a Call for Commentson the four-volume set of Digital Identity Guideline documents, including: Special Publication (SP) 800-63-3 Digital Identity Guidelines, SP 800-63A Enrollment and Identity Proofing, SP 800-63B Authentication and Lifecycle - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
Some cybersecurity best practices and guidance for Internet of Things (IoT) device manufacturers are now available from NIST’s Cybersecurity for IoT Program:NISTIR 8259A, IoT Device Cybersecurity Capability Core Baseline, identifies a core baseline of IoT device cybersecurity - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
   Researchers at Proofpoint have discovered a phishing campaign targeting companies within the United States’ utility sector. This campaign makes use of malicious documents to upload a remote access trojan (RAT) to the target’s system.    In July 2019, - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
    The modern workplace involves a great amount of collaboration between team members and the generation of electronic documents for various purposes.  However, sharing these documents in a secure manner, especially with remote employees, has always been a troublesome issue. - Read More
 
June 13th, 2020 | Jay Ferron | My information Resource
    The dark web is not the only place to find dark things. As we've shown in the past, there are plenty of criminals operating on the clear web, often in places more open than you'd expect. This week,  researchers from threat intelligence firm KELA released a report on a - Read More
 
May 1st, 2020 | Jay Ferron | My information Resource
    Researchers at Cybereason, a cybersecurity firm based in Boston, MA, have exposed a novel banking trojan attacking Android mobile devices dubbed Eventbot. The Eventbot malware was developed with original code from the ground up and is significantly different from all previously - Read More
 
April 30th, 2020 | Jay Ferron | My information Resource
Apple always took a firm stance on user security and reliability when it comes to their iPhone series. The iOS operating system is known as one of the most secure operating systems in the market. However, 2 major vulnerabilities have been recently discovered that have existed for years and are - Read More
 
April 30th, 2020 | Jay Ferron | My information Resource
    The Domain Name System (DNS) is something most of us use every day, whether we think about it or not. It is hugely convenient for converting human readable addresses into the addresses that computers actually use to communicate with each other. Sometimes this convenience can have - Read More
 
April 9th, 2020 | Jay Ferron | My information Resource
There is a security issues that most people do not know about .. That when you share a file in zoom  and other products, your computer can passes your NTLM security credentials, There is a GPO that should be set to only pass NTLM inside your domain (here the doc) https://docs.microsoft.com/ - Read More
 
April 9th, 2020 | Jay Ferron | My information Resource
March 9, 2020CMR 04-20Secret Service Issues COVID-19 (Coronavirus) Phishing Alert    WASHINGTON - Criminals are opportunists, and as seen in the past, any major news event can become an opportunity for groups or individuals with malicious intentions. The Coronavirus is no different. - Read More
 

Pages