The recent discovery of four defects in Microsoft’s Exchange Server software came too late to prevent a rash of stolen emails, but that doesn’t mean you need to remain vulnerable to this attack. Below is the story so far, and how you can help protect your business.
Macro Systems Blog
The Cybersecurity and Infrastructure Security Agency (CISA) have released an emergency directive concerning a critical exploit known as Zerologon, which affects servers running Windows Server operating systems that needs to get patched as soon as possible.
COVID-19, or coronavirus, has become a serious global health concern over the past couple of months. At this point, it is clear that this disease could have major impacts on the workplace. We wanted to offer a brief rundown of good workplace and network health practices, as well as a few pointers on how you can handle health-based employee absences.
Capital One is one of the biggest credit card companies in the world. On July 29th 2019, Capital One made an announcement: it was the victim of one of the largest data breaches in financial sector history. A former software engineer for Amazon has been indicted on charges related to the hacking.
If you have an Asus laptop, there is a possibility that a recent update could have installed malware. We are strongly recommending anyone who owns an Asus device reach out to us to have it looked at.
Like every other piece of equipment on your network, printers require careful configuration and regular maintenance to ensure that they aren’t placing your data and users at risk. Security researchers recently discovered two enormous vulnerabilities in HP Officejet All-in-One printers that make it very, very easy for hackers to spread malware and gain acquire to an organization’s network.
With Hurricanes Florence, Helene and Isaac causing problems around the globe this month, it seems as good a time as any to discuss preparing your business for hurricane season Preparing your organization for events like these is vital to its survival, making it crucial that you know what your responsibilities are when awaiting a potentially devastating event such as a hurricane.
Cybercriminals and hackers, like most people, have a tendency to gravitate towards high-reward activities. In this instance, that means that focus is turning to developing malware that attacks the router, potentially infecting the users that leverage it to connect wirelessly to the Internet. Researchers at Kaspersky Lab discovered an example of such a malware; let's examine this threat and how to best protect your network.
Twitter is strongly recommending that all 336 million users change their passwords as soon as possible; this is a result of the discovery of an internal security flaw. While the problem has been fixed and no data breach seems to have occurred, Twitter is clearly taking this situation seriously.
Virtual private networks are susceptible to an exploit that was recently revealed. Cisco has declared that this exploit undermines its Adaptive Security Appliance (ASA) tool. If this issue isn’t patched instantly, you could find your business vulnerable via remote code exploitation.
In a statement issued by Tom Bossert, the Homeland Security Adviser to the White House, responsibility for the WannaCry attacks from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This claim fits with the conclusions that New Zealand, Australia, Canada, and Japan have come to, according to Bossert.
A significant weakness has been discovered that affects all Wi-Fi users. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).
Using the most up-to-date versions of your technology’s operating systems is one of the best ways to stay secure. Yet, some organizations forego the jump to more recent operating systems due to the immense up-front expense represented by upgrading multiple servers or workstations at once. Unfortunately, this can be detrimental to your organization’s security, and potentially even put your business’s future at risk.
A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.
On June 12th, the U.S. Department of Homeland Security issued a warning to power grid operators and electric utilities concerning a newly surfaced malware called CrashOverride (aka Industroyer). Only, it’s not entirely new. The world has seen this before and the fallout from it is concerning.
Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.
On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.
Which database management system is running on your company’s server units? For end users, it’s not something that they put a whole lot of thought into. However, if you completely overlook your Microsoft SQL Server, you may end up running an expired version that puts your data at risk. Case in point, SQL Server 2005, which Microsoft recently ended support for.
Virtually every tech user wishes their mobile device battery would last longer, yet not every user understands that they can achieve this simply by adjusting their device settings. Here are seven simple adjustments you can make to your Android device in order to get its battery power to last longer.