IT and Business Insights for SMB Solution Providers

Tips and Advice

Blog Entry
December 16th, 2020 | Jay Ferron
 It's been a while since credit card and social security numbers were enough to supply the criminal market with stolen data. In the last few years there has been a marked increase in the amount of healthcare data up for sale thanks to some major data breaches and the notoriously poor security of smaller healthcare providers. - read more
 
ASCII Forum: Trending Topics
December 1st, 2020 | ChannelPro
Hot topics trending on the members-only ASCII Group Forum. Come join the conversation... - read more
 
Article
November 30th, 2020 | Mike Semel
Here are 10 risk management strategies to save your reputation, your mind, and your retirement. - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 Cybercriminals stole $15 million from a U.S. company by inserting themselves in email correspondence relating to legitimate business fund transfers. The tactic is called Business Email Compromise (BEC) and is one of the most financially damaging online crimes according to the FBI. BEC is a lucrative scam because we rely on email to conduct financial business transactions, such as wire transfers. - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 If you Google “Win10 zero-day”, you’ll likely find a number of results. Today’s zero-day is one that involves both Google Chrome and Microsoft Windows and is actively exploited. It has been disclosed with a proof of concept but is still not patched by Microsoft! - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 Cisco is warning of attacks actively exploiting the CVE-2020-3118 vulnerability found to affect carrier-grade routers running the Cisco IOS XR Software. The issue resides in the implementation of the Cisco Discovery Protocol for Cisco IOS XR Software and could allow an unauthenticated attacker to execute arbitrary code on the device. - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 When deploying new software for your enterprise, there are a number of things to consider: cost, hardware, and what value it provides. One area of consideration often lacking is how to ensure the software stays up to date and doesn’t become a security liability. Containerized applications usually excel in this area because they can be deployed and upgraded with ease. - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
  - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 
Blog Entry
November 21st, 2020 | Jay Ferron
 Title: Monitoring your Logic Apps Playbooks in Azure Sentinel - read more
 

Pages

Subscribe to Tips and Advice