IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
May 4th, 2019 | Jay Ferron | My information Resource
    E-mail changed the communication world forever, allowing for instant communication as opposed to what is now commonly referred to as “snail mail”. When it was designed, security was not really a concern that was built in. Over time cryptographic methods were developed - Read More
 
May 4th, 2019 | Jay Ferron | My information Resource
    The Dells SupportAssist software is currently associated with a vulnerability allowing Remote Code Execution (RCE) attacks. It comes pre-installed on virtually all new Dell devices running Windows®, the SupportAssist application "proactively checks the health of your system - Read More
 
May 2nd, 2019 | Jay Ferron | My information Resource
Wednesday, May 22, 2019 9:00 AM–11:00 AM Pacific Time Join this virtual event to learn about strategies, insights, and technologies to modernize and manage your Windows Server ecosystem. Be among the first to learn about - Read More
 
May 2nd, 2019 | Jay Ferron | My information Resource
    Researchers have found a new version of the Hawkeye malware kit and have noticed that alongside technical advances, they’ve included some business improvements.     While Hawkeye has been a product since 2013, the recent change in ownership at the end of 2018 - Read More
 
May 2nd, 2019 | Jay Ferron | My information Resource
   Macro enabled Office documents are a useful tool for automating advanced calculations in document files but they have a long history of abuse as well. They are easy to spot as documents containing embedded Visual Basic for Applications (VBA) code have a ‘m’ at the end of - Read More
 
May 2nd, 2019 | Jay Ferron | My information Resource
     With today’s cyber-focused society, there are numerous security companies constantly on the lookout for new variants of malware and threats that haven’t been seen before. So when new malware is discovered that not only provides a wide array of capabilities but - Read More
 
May 2nd, 2019 | Jay Ferron | My information Resource
  The Exodus spyware now also exists in the iOS ecosystem. The package can take and deliver audio recordings, pictures, contacts, and location data. The spyware researchers note that the iOS version of the spyware delivers itself via phishing sites that imitate mobile carriers from Italy and - Read More
 
March 29th, 2019 | Jay Ferron | My information Resource
Executive summary The software supply chain continues to be a popular channel for launching attacks. Publicly available reports indicate that attackers have reached a large number of devices through auto-update software provided with computers from Taiwanese manufacturer ASUS. In a campaign dubbed - Read More
 
March 23rd, 2019 | Jay Ferron | My information Resource
   A bug was discovered this week in Google Photos, where all photos in a users Google Photo account could have their metadata easily read and collected. Bad actors would target a particular query, for example, a location, and then measure the time it takes for the website to respond. - Read More
 
March 23rd, 2019 | Jay Ferron | My information Resource
Please share important information  this with those who you know.United States Attorney William P. Barr recently stated that crimes against the elderly target some of the most vulnerable people in our society. Because of their stage in life, they don't have the opportunity frequently to - Read More
 

Pages