IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
January 30th, 2018 | Jay Ferron | My information Resource
In honor of Data Privacy Day – an international effort held annually on Jan. 28 to generate awareness about the importance of respecting privacy, safeguarding data and enabling trust – the National Cyber Security Alliance (NCSA) hosted a - Read More
 
January 29th, 2018 | Jay Ferron | My information Resource
Tax Identity Theft Awareness Week is January 29 to February 2, and many federal agencies are offering information and resources to help consumers learn to protect themselves from tax-related identity theft and Internal Revenue Service (IRS) imposter scams.NCCIC/US-CERT encourages consumers to - Read More
 
January 23rd, 2018 | Jay Ferron | My information Resource
Original release date: January 23, 2018Apple has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.NCCIC/US-CERT encourages users and administrators to review Apple security pages - Read More
 
January 22nd, 2018 | Jay Ferron | My information Resource
SQL Server 2017 gives you the power to build modern applications using the language of your choice, on-premises and in the cloud, on Windows, Linux, and Docker containers. In two new titles from Microsoft Press, explore the concepts and methodologies of managing SQL Server databases with hands- - Read More
 
January 22nd, 2018 | Jay Ferron | My information Resource
PowerShell Core 6.0 is a new edition of PowerShell that is cross-platform (Windows, macOS, and Linux), open-source, and built for heterogeneous environments and the hybrid cloud.  From the Microsoft Blog First and foremost, thank you to all of our amazing community, especially our open- - Read More
 
January 22nd, 2018 | Jay Ferron | My information Resource
 5: Stages of a phishing attackPhase 1: Threat actor targets employee(s) via phishing campaignPhase 2: An employee opens the attack email which allows the threat actor access to load the malicious payload or compromise the user identityPhase 3: The workstation is compromised, threat actor - Read More
 
January 20th, 2018 | Jay Ferron | My information Resource
  Start off 2018 with these brand-new, member-exclusive ISACA offers:   NEW! Member-only content from MIT’s Center for Information Systems Research and Wapack Labs   NEW! GDPR Data Protection Impact Assessments—Free for a - Read More
 
January 20th, 2018 | Jay Ferron | My information Resource
 
January 20th, 2018 | Jay Ferron | My information Resource
Malicious documents have been discovered in the inboxes of several organizations involved in the Winter Olympics in Pyeongchang, South Korea. The initial target of the email was icehockey@pyeongchang2018.com, but several other organizations also involved with the event were included in the BCC line - Read More
 
January 20th, 2018 | Jay Ferron | My information Resource
This post is a little different than my normal but this is a good tool for Security professionals.WISER 5.1 is now available on all platforms! Take a quick look at the what's included in this release:CHEMM (“CHEMM 2.0”) has extensive new and updated content, e.g., guidance and - Read More
 

Pages