IT and Business Insights for SMB Solution Providers

Blog Entries

October 28th, 2019 | Jay Ferron | My information Resource
    Wandera’s threat research team has discovered 17* apps on the Apple App Store that are infected with clicker trojan malware. The apps communicate with a known command and control (C&C) server to simulate user interactions in order to fraudulently collect ad revenue.The - Read More
 
October 28th, 2019 | Jay Ferron | My information Resource
    Smartphones have become the icon of our modern technological society. They are so prevalent that app development has grown exponentially in recent years in the struggle to become the next Facebook or Pinterest. The phrase “There’s an app for that” truly - Read More
 
October 22nd, 2019 | Jay Ferron | My information Resource
NIST   National Vulnerability Database  - CVE-2019-17666 Detail                         Current Description - Read More
 
October 21st, 2019 | Jay Ferron | My information Resource
   The vast majority of websites these days have Hypertext Transfer Protocol Secure (HTTPS) enabled, adding a layer of security that protects our communications against eavesdropping and tampering. It is encrypted using Transport Layer Security (TLS), the current standard for secure web - Read More
 
October 21st, 2019 | Jay Ferron | My information Resource
  Phishing emails typically provide some obvious tells to their malicious nature. However, when a    phishing email contains information such as organizationspecific email bodies and email signatures, organization branding, and relevant news, it can be harder to distinguish the - Read More
 
October 21st, 2019 | Jay Ferron | My information Resource
    Researchers at Palo Alto's Unit 42 have discovered a worm that mines Monero, a privacy focused cryptocurrency, and spreads itself via infected Docker Daemons in the Docker Engine. Shodan scans of Docker engines show over 2000 unsecured Docker hosts. The researchers have named the - Read More
 
October 21st, 2019 | Jay Ferron | My information Resource
National Cyber Awareness System: NSA and NCSC Release Joint Advisory on Turla Group Activity10/21/2019 11:56 AM EDT Original release date: October 21, 2019The National Security Agency (NSA) and the United Kingdom National Cyber Security Centre (NCSC) have released a joint advisory on - Read More
 
October 19th, 2019 | Karl Palachuk | Small Biz Thoughts
My friend and former Marketing Manager Monica Caraway wrote a blog post recently, reporting on the InBound conference in Boston. Check it out here: 11 Actionable Marketing Tactics We Learned from Inbound 2019.Monica is now a Marketing Consultant with Orange Marketing  -  https://www. - Read More
 
October 16th, 2019 | Jay Ferron | My information Resource
    A commonly used method to secure network resources is a Virtual Private Network (VPN). They allow remote network devices to securely communicate with local resources as if they were physically plugged into the same network segment. You may even use one when working remotely to - Read More
 
October 12th, 2019 | Karl Palachuk | Small Biz Thoughts
Over at the Killing IT Podcast - killingit.smallbizthoughts.com - we are constantly talking about what's new, what's next, and what it means for IT consultants.One of our recurring topics is Drones - specifically drone aircraft. In fact, our Tuesday podcast includes a story about UPS developing ( - Read More
 

Pages