IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
March 3rd, 2018 | Jay Ferron | My information Resource
Software piracy has been an issue for about as long as there has been software to pirate. Companies are constantly developing new Digital Rights Management (DRM) solutions to protect their products, while software pirates, known as crackers, are constantly finding new ways to bypass these - Read More
 
March 3rd, 2018 | Jay Ferron | My information Resource
Original release date: March 02, 2018March 4–10 is National Consumer Protection Week (NCPW), an event to encourage people and businesses to learn more about avoiding scams and understanding consumer rights. During NCPW, the Federal Trade Commission (FTC) and its partners highlight free - Read More
 
February 22nd, 2018 | Jay Ferron | My information Resource
The Olympic Games have always been a symbol of global unity and cooperation, mixed in with friendly competition of course. However, this can also mark the games as a target for groups that don’t share that worldview. This year, the Winter Olympics opening ceremony was targeted by a - Read More
 
February 22nd, 2018 | Jay Ferron | My information Resource
NIST Computer Security Division Releases the Final Public Draft of Special Publication (SP) 800-171A, Assessing Security Requirements for Controlled Unclassified InformationNIST Computer Security Division releases the Final Public Draft of Special Publication (SP) 800-171A, Assessing Security - Read More
 
February 12th, 2018 | Jay Ferron | My information Resource
A 2017 Identity Fraud Study by Javelin Strategy & Research revealed that nearly one in three consumers notified that their data has been breached become victims of identity fraud. With the recent Equifax cyberattack still fresh in our minds, more than 145 million Americans’ names, - Read More
 
February 6th, 2018 | Jay Ferron | My information Resource
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore.Phishing scams, link bait, hacked software, hacks for software, keygens, screensavers, games, codecs, media files… the list goes on and on. Search for anything online you - Read More
 
February 6th, 2018 | Jay Ferron | My information Resource
The security features of modern PC hardware are enabling new trust boundaries and attack resistance capabilities unparalleled in software alone. These hardware capabilities help to improve resistance to a wide range of attacks including physical attacks against DMA and disk encryption, kernel - Read More
 
February 6th, 2018 | Jay Ferron | My information Resource
Many recent cyberattacks have been confirmed in which malware infects a host and in turn spreads to other hosts and internal servers, resulting in the whole organization becoming compromised. In such cases, many points need to be investigated. Accordingly, an approach for quickly and thoroughly - Read More
 
February 2nd, 2018 | Jay Ferron | My information Resource
Earlier this week Cisco revealed a major vulnerability affecting devices configured with their WebVPN clientless VPN software. This VPN software is featured in the Secure Sockets Layer (SSL) of numerous Cisco hardware devices. Companies around the world use WebVPN so that their employees can - Read More
 
February 1st, 2018 | Jay Ferron | My information Resource
This is a summary of a blog post on Microsoft site the full article can be found here.Servicing extensions for Windows 10Windows 10 is being adopted rapidly by organizations of all sizes, and as customers deploy the product they are implementing a modern servicing methodology we refer to as - Read More
 

Pages