Cybersecurity

Two Critical Windows 10 Vulnerabilities, Update Now

Posted on

If you’re running any version of Windows 10, you should update your computer as soon as possible. Microsoft recently alerted users that it patched two critical remote code execution (RCE) “wormable” vulnerabilities, which could have allowed hackers to spread malware to both your — and others — PCs without your knowledge or any interaction. Currently, […]

Cybersecurity

Steps to Safeguard Against Ransomware Attacks

Posted on

The Cybersecurity and Infrastructure Security Agency (CISA), Multi-State Information Sharing & Analysis Center (MS-ISAC), National Governors Association (NGA), and the National Association of State Chief Information Officers (NASCIO) have released a Joint Ransomware Statement with recommendations for state and local governments to build resilience against ransomware: Back up systems—now (and daily). Immediately and regularly back […]

Cybersecurity

Do Not Assign IoT Public IP Addresses

Posted on

Recently, I stumbled backward across a number of organizations in the healthcare sector who have been assigning publicly addressable static IP’s to their IoT. Given the number of affordable, secure and encrypted RA tools available to both internal IT and MSP’s alike this is a maddening access solution that places organizations at substantial and unwarranted […]

Cybersecurity

What Home Firewall Do You Recommend?

Posted on

One of the questions I am often asked is what if any hardware firewall do I suggest for users to deploy at home? To be honest, that is a question I have historically struggled to answer as previously no single solution has truly felt like a one-stop-shop capable of handling most home user’s needs. In […]

Cybersecurity

Microsoft Bluekeep Vulnerability Explained 

Posted on

In the May 2019 Patch Tuesday release, Microsoft disclosed a remote code execution vulnerability (CVE-2019-0708) exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability only exists in older Windows operating systems (Windows XP, Vista, […]