IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
December 12th, 2019 | Jay Ferron | My information Resource
A virtual private network (VPN) is supposed to keep the user's traffic over a network safe from outside onlookers. They act as a protected path for communication over a public network to gain access to the resources and capabilities of the private network without a physical connection. Researchers - Read More
 
December 12th, 2019 | Jay Ferron | My information Resource
    Smart TVs have become extremely common in the last few years; it is even difficult to buy a new TV without smart functionality. Having Netflix streaming built into your TV can be convenient, but connecting your TV to the internet might not be the best idea. The FBI issued a - Read More
 
December 12th, 2019 | Jay Ferron | My information Resource
NIST invites comments on Draft NIST Special Publication (SP) 800-208, Recommendation for Stateful Hash-Based Signature Schemes. All of the digital signature schemes specified in Federal Information Processing Standards Publication (FIPS) 186-4 will be broken if large-scale quantum computers are - Read More
 
December 3rd, 2019 | Jay Ferron | My information Resource
Trend Micro report thisBehavior analysisCallerSpy claims it’s a chat app, but we found that it had no chat features at all and it was riddled with espionage behaviors. When launched, CallerSpy initiates a connection with the C&C server via Socket.IO to monitor upcoming commands. It then - Read More
 
December 1st, 2019 | Jay Ferron | My information Resource
National Cyber Awareness System:Caller Poses as CISA Rep in Extortion Scam Original release date: November 29, 2019The Cybersecurity and Infrastructure Security Agency (CISA) is aware of a phone scam where a caller pretends to be a CISA representative. The scammer claims to have knowledge of - Read More
 
November 15th, 2019 | Jay Ferron | My information Resource
   The out of band management system bundled on almost all Intel processors has become a hot target for attackers in recent years. This is because it runs alongside the main processor and has virtually unrestricted access to all the hardware in the machine. As long as the machine has - Read More
 
November 15th, 2019 | Jay Ferron | My information Resource
    Researchers at Bitdefender have found a vulnerability in Amazon’s Ring Video Doorbell which allows an attacker with proximity to the device to intercept the Wi-Fi credentials of the network it operates on, which could lead to further attacks to devices on the network. The - Read More
 
November 13th, 2019 | Jay Ferron | My information Resource
    Amazon Alexa and Google Home are listening. It’s likely you are aware of the security and privacy concerns as well as their mitigations. It’s the price we pay for the technology we want. Unfortunately, there is another attack vector recently exposed by researchers at - Read More
 
November 13th, 2019 | Jay Ferron | My information Resource
    Multinational software company Adobe has suffered a data leak that exposed the account information of an estimated 7.5 million customers, according to security researcher Bob Diachenko. Those affected were subscribers to Adobe’s Creative Cloud service which provides users - Read More
 
November 1st, 2019 | Jay Ferron | My information Resource
    Security, for many, seems hard to do right.   I know that we all think about firewalls, patch management, antivirus and physical security.   But I like to cover an area that does not get focused on by most companies.     Baseline and - Read More
 

Pages