IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
March 1st, 2022 | Jay Ferron | My information Resource
 Our new UpdraftPlus release, 1.22.3 (free version) / 2.22.3 (paid versions) is a security release. The short version is: you should update. To get the details, read on!On the evening of February 15th, we received a security defect report from security researcher Marc-Alexandre Montpas of - Read More
 
February 25th, 2022 | Jay Ferron | My information Resource
 Share a Free Entry-Level CybersecurityCertification Exam VoucherShare the Link: www.isc2.org/Voucher-Offer Share the Code: CYBERSTARTLimited so act fast As a pilot program participant, you will help us evaluate the effectiveness of the exam and its ability to accurately assess candidates’ grasp of - Read More
 
February 25th, 2022 | Jay Ferron | My information Resource
 The bug (CVE-2021-45388) was discovered by researchers at SentinelOne. Researchers claim the high-severity flaw exists in the KCodes NetUSB kernel module used by a large number of network device vendors.According to the researchers, NetUSB is a product by KCodes, that allows remote devices in a - Read More
 
February 24th, 2022 | Jay Ferron | My information Resource
(ISC)² has begun the exciting process of exploring the creation of a new certification. To fill the cybersecurity workforce gap, we need to address the workforce shortage facing the industry, especially among entry- and junior-level positions. A foundational cybersecurity certification will help ( - Read More
 
February 24th, 2022 | Jay Ferron | My information Resource
 Microsoft 365 Zero Trust deployment planThis article provides a deployment plan for building Zero Trust security with Microsoft 365. Zero Trust is a new security model that assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the - Read More
 
February 24th, 2022 | Jay Ferron | My information Resource
The Cybersecurity and Infrastructure Security Agency (CISA) is aware of compromises affecting a number of U.S. government agencies, critical infrastructure entities, and other private sector organizations by a cyber threat actor—or actors—beginning in June 2020 or earlier related to vulnerabilities - Read More
 
February 24th, 2022 | Jay Ferron | My information Resource
Cyclops Blink is a malicious Linux ELF executable, compiled for the 32-bit PowerPC (big-endian) architecture.     Persistence is maintained throughout the legitimate device firmware update process.     Implements a modular framework consisting of a core component and additional modules that are - Read More
 
February 21st, 2022 | Jay Ferron | My information Resource
 Here is a great article form VMwareVMware report finds more than half of Cobalt Strike users are using the tool illicitlyPALO ALTO, Calif. – As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud - Read More
 
February 21st, 2022 | Jay Ferron | My information Resource
 The Federal Bureau of Investigation (FBI) and the United States Secret Service (USSS) have released a joint Cybersecurity Advisory (CSA) identifying indicators of compromise associated with BlackByte ransomware. BlackByte is a Ransomware-as-a-Service group that encrypts files on compromised - Read More
 
February 21st, 2022 | Jay Ferron | My information Resource
The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI) and the National Security Agency (NSA), issued a joint Cybersecurity Advisory titled, “Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain - Read More
 

Pages