IT and Business Insights for SMB Solution Providers

Jay Ferron

I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.

My information Resource
December 5th, 2018 | Jay Ferron | My information Resource
As a security professional, I understand the importance of using data classification to protect a company.  The day of believing that the firewall will protect you is unreal.  Today lots of companies treat computer security like a tomato, “secure” on the outside but leave - Read More
 
December 2nd, 2018 | Jay Ferron | My information Resource
Dropbox recently revealed three critical security vulnerabilities in MacOS that would allow execution of arbitrary programs on a target machine triggered just by visiting a webpage. The vulnerabilities were found by the cybersecurity firm Syndis, who were hired for red team exercises on Dropbox - Read More
 
November 30th, 2018 | Jay Ferron | My information Resource
This is an article from Microsoft that i thought was intresting..On Nov. 27 and 28, over 100 local India law enforcement officials from Gurgaon and Noida raided 16 call center locations identified as engaged in tech support fraud by Microsoft, resulting in 39 arrests so far. These call center - Read More
 
November 30th, 2018 | Jay Ferron | My information Resource
30 November 2018 Marriott values our guests and understands the importance of protecting personal information. We have taken measures to investigate and address a data security incident involving the Starwood guest reservation database. The investigation has determined that there was unauthorized - Read More
 
November 27th, 2018 | Jay Ferron | My information Resource
National Cyber Awareness System: TA18-331A: 3ve – Major Online Ad Fraud Operation11/27/2018 12:09 PM EST Original release date: November 27, 2018Systems AffectedMicrosoft WindowsOverviewThis joint Technical Alert (TA) is the result of analytic efforts between the Department of - Read More
 
November 12th, 2018 | Jay Ferron | My information Resource
They are many different approaches to helping a company look at protection of assets and data for a repeatable process.There is Cobitby ISACA, COBIT stands for Control Objectives for Information and Related Technology. It is a framework created by the ISACA (Information Systems Audit and Control - Read More
 
November 9th, 2018 | Jay Ferron | My information Resource
Keyboard shortcuts are keys or combinations of keys that provide an alternative way to do something that you’d typically do with a mouse.Copy, paste, and other general keyboard shortcuts Press this key To do this Ctrl + X Cut the selected item Ctrl + C (or Ctrl + Insert) Copy the - Read More
 
October 26th, 2018 | Jay Ferron | My information Resource
Relative Identifier (RID) Hijacking has recently gained public attention as a simple, novel, and effective technique to maintain persistence on a Windows system after initial compromise. As information security awareness continues to rise in many organizations their overall security posture also - Read More
 
October 26th, 2018 | Jay Ferron | My information Resource
A zero-day exploit in the jQuery file upload tool may have had an open secret for years. A security researcher at Akamai Security Intelligence Response Team (SIRT) by the name of Larry Cashdollar found the exploit designated CVE-20189206. The vulnerability affects the plugin authored by Sabastian - Read More
 
October 20th, 2018 | Jay Ferron | My information Resource
Here is a Blog from Microsoft about changes to Windows 10 1809.Features we removed in this releaseWe're removing the following features and functionalities from the installed product image in Windows 10, version 1809. Applications or code that depend on these features won't function in this - Read More
 

Pages