IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
June 2nd, 2016 | Jay Ferron | My information Resource
The Internet Crime Complaint Center (IC3) continues to receive reports from individuals who have received extortion attempts via e-mail related to recent high-profile data thefts. The recipients are told that personal information, such as their name, phone number, address, credit card information, - Read More
May 31st, 2016 | Jay Ferron | My information Resource
Call For Speakers – OPENYou are invited to the Capital of the World, New York City for the 3rd Annual Joint Cyber Security Conference on October 5th 2016.  The event will be feature internationally recognized  presentations delivered by security researchers, industry - Read More
May 28th, 2016 | Jay Ferron | My information Resource
Windows 10 IT Pro Essentials: Top 10 Tools Dive in to Windows 10 with award-winning journalist and Windows Expert Ed Bott in this highly curated free eBook covering the top apps, accessories, and utilities includ...ed in the box with Windows 10.The sheer volume of Windows programs and - Read More
April 16th, 2016 | Jay Ferron | My information Resource
FBI officials are warning potential victims of a dramatic rise in the business e-mail compromise scam or “B.E.C.,” a scheme that targets businesses and has resulted in massive financial losses in Phoenix and other cities. The schemers go to great lengths to spoof company e-mail or - Read More
April 16th, 2016 | Jay Ferron | My information Resource
As previously reported by the media in and after July 2015, security researchers evaluating automotive cybersecurity were able to demonstrate remote exploits of motor vehicles. The analysis demonstrated the researchers could gain significant control over vehicle functions remotely by exploiting - Read More
April 16th, 2016 | Jay Ferron | My information Resource
Each year, criminal actors target US persons and visa holders for Stolen Identity Refund Fraud (SIRF). SIRF is defined as the fraudulent acquisition and use of the Personally Identifiable Information (PII) of US persons or visa holders to file tax returns. The fraudulent tax returns are sent to - Read More
April 16th, 2016 | Jay Ferron | My information Resource
 Systems AffectedMicrosoft Windows with Apple QuickTime installed OverviewAccording to Trend Micro, Apple will no longer be providing security updates for QuickTime for Windows, leaving this software vulnerable to exploitation. DescriptionAll software products have a lifecycle. Apple will - Read More
March 23rd, 2016 | Jay Ferron | My information Resource
Ransomware is a type of malware that restricts access to the infected computer system in some way, and demands that the user pay a ransom to the malware operators to remove the restriction.  The usual way one get infected is by open an email with an attachment. But now there is a new way. - Read More
March 17th, 2016 | Jay Ferron | My information Resource
Rolling Meadows, IL, USA (March 17 2016)—Jay Ferron will discuss Windows 10 Security at ISACA’s ISACA’s North America CACS conference 2-4 May 2016 in New Orleans, Louisiana, USA. Attendees will gain discuss solutions and strategies in assurance, risk and security, including - Read More
March 17th, 2016 | Jay Ferron | My information Resource
The MCP exam prep sessions you know and love at Microsoft conferences, now available on Channel 9! In these hour-long videos, Microsoft Certified Trainers and MVPs take you through the exam objectives and get you ready for test day Prepare for Microsoft Exam 70-697: Configuring Windows - Read More