IT and Business Insights for SMB Solution Providers

Technology

Article
November 9th, 2018 | James E. Gaskin
For 35 years, PC users have focused on local magnetic hard drives for storage. Those days are spinning away quickly. - read more
 
Blog Entry
November 9th, 2018 | Jay Ferron
Keyboard shortcuts are keys or combinations of keys that provide an alternative way to do something that you’d typically do with a mouse. - read more
 
Slide Gallery
November 6th, 2018 | Colleen Frye
Businesses looking for help with digital transformation are not taking an RFP, linear approach to purchasing, so stake out a specialty or niche and grow your influence from there. - read more
 
Blog Entry
October 26th, 2018 | Jay Ferron
Relative Identifier (RID) Hijacking has recently gained public attention as a simple, novel, and effective technique to maintain persistence on a Windows system after initial compromise. As information security awareness continues to rise in many organizations their overall security posture also increases, especially in larger organizations that can afford it. - read more
 
Blog Entry
October 26th, 2018 | Jay Ferron
A zero-day exploit in the jQuery file upload tool may have had an open secret for years. A security researcher at Akamai Security Intelligence Response Team (SIRT) by the name of Larry Cashdollar found the exploit designated CVE-20189206. The vulnerability affects the plugin authored by Sabastian Tschan commonly known as “blueimp”. - read more
 
News
October 26th, 2018 | Colleen Frye with Michael Siggins
Microsoft is showing the partner ecosystem it is all-in with IoT and aims to accelerate their time to value, according to the firm’s Rodney Clark (pictured). - read more
 
Blog Entry
October 20th, 2018 | Jay Ferron
Here is a Blog from Microsoft about changes to Windows 10 1809. Features we removed in this release - read more
 
Blog Entry
 
Blog Entry
October 20th, 2018 | Jay Ferron
For the past four years, thousands of servers may have been subject to an  extremely simple authentication bypass vulnerability. CVE-2018-10933 affects libssh versions since 0.6.0, an implementation library for Secure Shell (SSH) that was released in 2014. It is limited only to certain implementations of SSH and does not affect the widely-used OpenSSH.  - read more
 
Blog Entry
October 20th, 2018 | Jay Ferron
Advanced Persistent Threats (APT) are being recognized as one of the biggest cyber threats in the industry today. There are many groups globally behind the numerous attacks of this type in recent history. Three major cyber incidents that garnered global attention were the BlackEnergy power grid attack, the Industroyer power grid attack, and the NotPetya malware outbreak. - read more
 

Pages

Subscribe to Technology