IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
December 16th, 2020 | Jay Ferron | My information Resource
 Microsoft recently blogged about the Recent Nation-State Cyber Attacks that has impacted high value targets both across the government and private sector. This attack is also known as Solorigate or Sunburst. This threat actor is believed to be highly sophisticated and motivated. Relevant - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
This week, the NSA released an announcement saying, “Russian state- sponsored malicious cyber actors are exploiting a vulnerability in VMware Access and VMware Identity Manager2 products, allowing the actors access to protected data and abusing federated authentication.” This - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
ESET researchers have recently released information on the discovery of a new backdoor dubbed Crutch that uses Dropbox to exfiltrate stolen files. Crutch has been seen as early as 2015 and is believed to be a second-stage backdoor that is deployed after a victim has already been compromised. - Read More
 
December 16th, 2020 | Jay Ferron | My information Resource
 It's been a while since credit card and social security numbers were enough to supply the criminal market with stolen data. In the last few years there has been a marked increase in the amount of healthcare data up for sale thanks to some major data breaches and the notoriously poor security - Read More
 
November 21st, 2020 | Jay Ferron | My information Resource
 Cybercriminals stole $15 million from a U.S. company by inserting themselves in email correspondence relating to legitimate business fund transfers. The tactic is called Business Email Compromise (BEC) and is one of the most financially damaging online crimes according to the FBI. BEC is a - Read More
 
November 21st, 2020 | Jay Ferron | My information Resource
 If you Google “Win10 zero-day”, you’ll likely find a number of results. Today’s zero-day is one that involves both Google Chrome and Microsoft Windows and is actively exploited. It has been disclosed with a proof of concept but is still not patched by Microsoft!The - Read More
 
November 21st, 2020 | Jay Ferron | My information Resource
 Cisco is warning of attacks actively exploiting the CVE-2020-3118 vulnerability found to affect carrier-grade routers running the Cisco IOS XR Software. The issue resides in the implementation of the Cisco Discovery Protocol for Cisco IOS XR Software and could allow an unauthenticated - Read More
 
November 21st, 2020 | Jay Ferron | My information Resource
 When deploying new software for your enterprise, there are a number of things to consider: cost, hardware, and what value it provides. One area of consideration often lacking is how to ensure the software stays up to date and doesn’t become a security liability. Containerized - Read More
 
November 21st, 2020 | Jay Ferron | My information Resource
 Title: Secure your GitHub deployment using Microsoft Cloud App SecurityURL: https://techcommunity.microsoft.com/t5/microsoft-security-and/secure-your-github-deployment-using-microsoft-cloud-app-security/ba-p/1882423Overview: Welcome to newest post in our series on how to protect your API - Read More
 
November 21st, 2020 | Jay Ferron | My information Resource
PROTECT YOUR BUSINESS AND ASSETS FROM HACKERS!How your business RIGHT NOW is at risk for losing considerable productivity, sales, customers, lawsuits and money from  malware attacksWhy YOUR BUSINESS is the #1 target for cyberattacks, and  why YOU are your business’s - Read More
 

Pages