IT and Business Insights for SMB Solution Providers

Tips and Advice

Blog Entry
November 21st, 2020 | Jay Ferron
 Cybercriminals stole $15 million from a U.S. company by inserting themselves in email correspondence relating to legitimate business fund transfers. The tactic is called Business Email Compromise (BEC) and is one of the most financially damaging online crimes according to the FBI. BEC is a lucrative scam because we rely on email to conduct financial business transactions, such as wire transfers. - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 If you Google “Win10 zero-day”, you’ll likely find a number of results. Today’s zero-day is one that involves both Google Chrome and Microsoft Windows and is actively exploited. It has been disclosed with a proof of concept but is still not patched by Microsoft! - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 Cisco is warning of attacks actively exploiting the CVE-2020-3118 vulnerability found to affect carrier-grade routers running the Cisco IOS XR Software. The issue resides in the implementation of the Cisco Discovery Protocol for Cisco IOS XR Software and could allow an unauthenticated attacker to execute arbitrary code on the device. - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 When deploying new software for your enterprise, there are a number of things to consider: cost, hardware, and what value it provides. One area of consideration often lacking is how to ensure the software stays up to date and doesn’t become a security liability. Containerized applications usually excel in this area because they can be deployed and upgraded with ease. - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
  - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 
Blog Entry
November 21st, 2020 | Jay Ferron
 Title: Monitoring your Logic Apps Playbooks in Azure Sentinel - read more
 
Blog Entry
November 21st, 2020 | Jay Ferron
 Riding on the edge of current events is one of the best ways to catch someone unaware. Having, or hinting at, something that is still unknown can provide enough cover for a malicious entity to confuse a victim into falling for a trap. A common technique includes providing false updates for a program that is new enough to precede the victim’s expertise, thus taking advantage of their naiveé. - read more
 
Blog Entry
 
Blog Entry
 

Pages

Subscribe to Tips and Advice