IT and Business Insights for SMB Solution Providers

My Information Resource

Blog Entry
May 14th, 2019 | Jay Ferron
Microsoft released fixes for a critical Remote Code Execution vulnerability, CVE-2019-0708, in Remote Desktop Services – formerly known as Terminal Services – that affects some older versions of Windows. The Remote Desktop Protocol (RDP) itself is not vulnerable. This vulnerability is pre-authentication and requires no user intera - read more
 
Blog Entry
May 8th, 2019 | Jay Ferron
Microsoft is excited to announce enhancements to BitLocker management capabilities in both Microsoft Intune and System Center Configuration Manager (SCCM), coming in the second half of 2019. - read more
 
Blog Entry
May 6th, 2019 | Jay Ferron
Normally I would not post a Phishing attack but this one seems to be working - read more
 
Blog Entry
May 4th, 2019 | Jay Ferron
    E-mail changed the communication world forever, allowing for instant communication as opposed to what is now commonly referred to as “snail mail”. When it was designed, security was not really a concern that was built in. - read more
 
Blog Entry
May 4th, 2019 | Jay Ferron
    The Dells SupportAssist software is currently associated with a vulnerability allowing Remote Code Execution (RCE) attacks. It comes pre-installed on virtually all new Dell devices running Windows®, the SupportAssist application "proactively checks the health of your system’s hardware and software. When an issue is detected, the necessary system state information is sent to Dell for troubleshooting to begin." - read more
 
Blog Entry
May 2nd, 2019 | Jay Ferron
Wednesday, May 22, 2019 9:00 AM–11:00 AM Pacific Time - read more
 
Blog Entry
May 2nd, 2019 | Jay Ferron
    Researchers have found a new version of the Hawkeye malware kit and have noticed that alongside technical advances, they’ve included some business improvements. - read more
 
Blog Entry
May 2nd, 2019 | Jay Ferron
   Macro enabled Office documents are a useful tool for automating advanced calculations in document files but they have a long history of abuse as well. They are easy to spot as documents containing embedded Visual Basic for Applications (VBA) code have a ‘m’ at the end of the filename, e.g .xlsm or .docm. When opening these files Microsoft Office asks if you would like to enable the embedded macros, and for good reason. - read more
 

Pages

Subscribe to My Information Resource