IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
August 2nd, 2023 | Jay Ferron | My information Resource
Description Sensitive information on the Wi-Fi connection settings stored in the memories of inkjet printers (home and office/large format) may not be deleted by the usual initialization process. Affected Products/Versions Please check the affected inkjet printer models from here. - Read More
 
August 2nd, 2023 | Jay Ferron | My information Resource
When investigating an incident, analysts follow certain steps – tasks – to ensure that the investigation is conducted effectively and efficiently. Standardizing the process is necessary for both generic steps and specific types of incidents, and their availability in the context of the incident - Read More
 
August 2nd, 2023 | Jay Ferron | My information Resource
Window notebook and All-in-one come with a Power setting set to balanced, but there is a Hidden way to expose to Choose the High performance mode power plan. Go to your windows prompt and type the following. powercfg -SETACTIVE 8c5e7fda-e8bf-4a96-9a85-a6e23a8c635c After typing the above - Read More
 
July 31st, 2023 | Jay Ferron | My information Resource
PII compromised in a data breach could be used or sold for identity theft schemes. Dark web marketplaces, forums, and websites offer a spectrum of products and services that monetize stolen personal and financial data, corporate and social media account details, as well as counterfeit documents and - Read More
 
July 31st, 2023 | Jay Ferron | My information Resource
CISA analyzed backdoor malware variants obtained from an organization that had been compromised by threat actors exploiting the vulnerability. Barracuda Exploit Payload and Backdoor – The payload exploits CVE-2023-2868, leading to dropping and execution of a reverse shell backdoor on ESG - Read More
 
July 31st, 2023 | Jay Ferron | My information Resource
Washington D.C., July 26, 2023 — The Securities and Exchange Commission today adopted rules requiring registrants to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and - Read More
 
July 31st, 2023 | Jay Ferron | My information Resource
In cloud environments, cryptojacking – a type of cyberattack that uses computing power to mine cryptocurrency – takes the form of cloud compute resource abuse, which involves a threat actor compromising legitimate tenants. Cloud compute resource abuse could result in financial loss to targeted - Read More
 
July 31st, 2023 | Jay Ferron | My information Resource
joint_csa_preventing_web_application_access_control_abuseDownload - Read More
 
July 31st, 2023 | Jay Ferron | My information Resource
Collaborate with the NCCoE Healthcare Team on the Mitigating Cybersecurity Risk in Telehealth Smart Home Integration Project Back in April 2023, the National Cybersecurity Center of Excellence (NCCoE) issued a Federal Register Notice (FRN) inviting interested organizations to participate in the - Read More
 
July 28th, 2023 | Jay Ferron | My information Resource
Steering Toward Mobile Driver’s Licenses The NCCoE Buzz: Mobile Security Edition is a recurring email on timely topics in mobile device cybersecurity and privacy from the National Cybersecurity Center of Excellence’s (NCCoE’s) Mobile Device Security project team. Have you ever thought about having - Read More
 

Pages