IT and Business Insights for SMB Solution Providers

Tips and Advice

Blog Entry
July 18th, 2022 | Jay Ferron
A Florida-based CEO was charged with selling $1 billion worth of counterfeit Cisco equipment imported from China, according to the Department of Justice.   - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE)  - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
This Public Service Announcement is an update and companion piece to Business Email Compromise PSA I-091019-PSA posted on www.ic3.gov. This PSA includes new Internet Crime Complaint Center complaint information and updated statistics from October 2013 to December 2021. - read more
 
Blog Entry
July 7th, 2022 | Jay Ferron
The FBI Internet Crime Complaint Center (IC3) warns of an increase in complaints reporting the use of deepfakes and stolen Personally Identifiable Information (PII) to apply for a variety of remote work and work-at-home positions. Deepfakes include a video, an image, or recording convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said. - read more
 
ASCII Forum: Trending Topics
July 6th, 2022 | ChannelPro
Hot topics trending on the members-only ASCII Group Forum. Come join the conversation... - read more
 
Blog Entry
July 6th, 2022 | Jay Ferron
 This uses vulnerabilities in Remote Desktop Protocol (RDP) to access victims’ networks - read more
 
Blog Entry
July 5th, 2022 | Jay Ferron
 NIST Announces the Release of Draft NIST IR 8323 Revision 1 | Foundational PNT Profile: Applying the Cybersecurity Framework for the Responsible Use of Positioning, Navigation, and Timing (PNT) Services.  - read more
 
Blog Entry
July 5th, 2022 | Jay Ferron
 This is an IN-Person Event - read more
 
Blog Entry
July 5th, 2022 | Jay Ferron
NIST has completed the third round of the Post-Quantum Cryptography (PQC) standardization process, which selects public-key cryptographic algorithms to protect information through the advent of quantum computers. A total of four candidate algorithms have been selected for standardization: CRYSTALS-KYBER, CRYSTALS-Dilithium, FALCON, and SPHINCS+. - read more
 

Pages

Subscribe to Tips and Advice