Security Updates

When is it OK to use a personal email for business purposes?

The short answer is never, but individual proprietors, consultants, can often revert to “personal” email accounts. Personal email accounts exist outside of the IT department’s control.   They are not subject to backup, archiving, security or governance so using them for business purposes, is a clear violation of compliance regulations. And since personal emails are not

By |2022-01-14T09:19:24-05:00January 14th, 2022|Security Updates|

Don’t be that employee: How to avoid ransomware attacks at work

For more details, I encourage you to check out the in-depth article from The Washington Post. Tempting clicks Often, bad actors trick employees by using websites, URLs and email addresses that are just a letter or two off from their legitimate counterparts. For example, becomes If an email looks suspicious, hunting for alternate

By |2021-09-15T11:32:18-04:00September 15th, 2021|Security Updates|

2021-09-08: Office Document Attacks

2021-09-08: Exploit Mitigation for Microsoft MSHTML Remote Code Execution Vulnerability Microsoft is investigating reports of a remote code execution vulnerability in MSHTML that affects Microsoft Windows. Microsoft is aware of targeted attacks that attempt to exploit this vulnerability by using specially-crafted Microsoft Office documents. This attack can be mitigated using some registry edits as documented

By |2021-09-13T09:03:59-04:00September 8th, 2021|Security Updates|

2021-07-06: Print Server Exploits

2021-07-06: Fix for PrintNightmare exploit until a patch is available From Microsoft's Windows Print Spooler Remote Code Execution Vulnerability A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install

By |2021-09-08T12:00:04-04:00July 6th, 2021|Security Updates|
Go to Top