IT and Business Insights for SMB Solution Providers

Technology

Blog Entry
January 29th, 2019 | Jay Ferron
If you heard me talk I say many time we need to start classify our data so the we can protect the critical files and add additional security to those files that are at the highest risk. - read more
 
Blog Entry
January 29th, 2019 | Jay Ferron
Original release date: January 28, 2019 - read more
 
Blog Entry
January 26th, 2019 | Jay Ferron
    On Friday, February 1, major DNS (Domain Name System) software and public DNS providers will remove support for workarounds accommodating authoritative DNS servers that don’t follow published operational standards1. Most EDU sites will not be affected; however, institutions using authoritative servers that don’t meet standards may find their IT-based resources unreachable by large portions of the Internet. - read more
 
Blog Entry
January 23rd, 2019 | Jay Ferron
      Radio-frequency (RF) remote controllers are everywhere: they open your car and your garage, they connect peripherals to your computer. You will also find them widely used in manufacturing and construction. - read more
 
Blog Entry
January 23rd, 2019 | Jay Ferron
     Researchers at Qualys have revealed three security vulnerabilities in a component of systemd. This is believed to be affecting almost all of the systemd based Linux distros. The silver lining is that most of the distros have been made aware of the issue and have been working on fixes for these exploits. - read more
 
Blog Entry
January 23rd, 2019 | Jay Ferron
     What you know, what you are, and what you have. These are three of the key components of security. Key cards are a common form of security that can deny access to a space or object to anyone without an object with the proper credentials. Researchers at Tenable have discovered a series of flaws discovered in September of last year. The flaws pertain to PremiSys Identicard Access control System. - read more
 
Blog Entry
 
Blog Entry
January 12th, 2019 | Jay Ferron
    Researchers at Defiant Threat Intelligence Team have identified a brute force attack campaign on WordPress sites. There have been four command and control (C2) servers identified, over 14,000 proxy servers from best-proxies.ru, and over 20,000 infected WordPress sites. The attacks make XML-RPC authentication attempts against accounts. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
To help developers build and run their applications, services and integrate upcoming technologies, Microsoft has released an eBook – Learn Azure in a Month of Lunches. The eBook offers great insights into entry into cloud administration. Besides, it also gives a high-level explanation of each concept and common implementations. It breaks down the most important Azure concepts into bite-sized lessons. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    Cybersecurity professionals have known for a long time that passwords alone are not secure enough. Two-factor Authentication (2FA) has become an increasingly common way to add another layer of security. But like anything else in the security world, it is not infallible. - read more
 

Pages

Subscribe to Technology