TSI's Information Technology Blog
What To Do: Apache’s Log4j Vulnerability
Apache’s Log4j is a powerful open-source logging library used by millions of developers worldwide. However, Apache recently discovered an extremely dangerous vulnerability that could leave your applications and servers vulnerable to attack! In this blog post, we will explain what the Log4j vulnerability is, and how you can protect your organization from being exploited. We will also provide instructions on how to upgrade your Log4j installation. So don’t wait –…
ContinuedJonas: Target of a Security Breach
We wanted to bring to your attention that Jonas has recently been the target of a security breach. The breach appears not to pose any immediate risk at present, but it may become an issue down the road, so we’re proactively reviewing updates from JONAS to address the potential impact. In short, we wanted to take the opportunity to address any potential concerns you currently may have and inform you…
ContinuedGoDaddy’s Data Breach Exposes 1.2M Customers
There has been a data breach involving 1.2 million GoDaddy customers that we would like to bring your attention to. This breach has only impacted organizations using GoDaddy’s Managed WordPress service, so if your organization subscribes to this service, it’s absolutely critical that you work with your website administrator to reset your passwords as soon as possible to avoid any further data loss or exposure to your site. GoDaddy disclosed…
ContinuedMicrosoft’s PrintNightmare Vulnerability Finally Patched!
We are happy to inform you that the PrintNightmare vulnerability has now been resolved. Once the patch is checked by our team and they begin applying it during the pre-scheduled maintenance window, you will be able to access print services at any time throughout the day moving forward. In order for this patch to be applied, it’s absolutely critical that your users reboot their machines- not just shut them down-…
ContinuedCreating and Managing a Sustainable CMMC Compliance Program
In partnership with Exostar, TSI held a successful webinar on the topic of “Creating and Managing a Sustainable CMMC Compliance Program”. Our webinar was recorded HERE, allowing you to get an understanding of our approach to helping businesses to achieve and maintain a successful cybersecurity program toward CMMC compliance. Furthermore, we have addressed topics such as policy development and documentation, IT CMMC requirements, engaging with CMMC 3 certificate ready RPO/Service…
ContinuedCyber Risk Alert: Windows 11 Security Concerns & Why You Shouldn’t Download the Update
Microsoft may have prompted you to download the latest Windows 11 update . Please do not download it, and advise your team as soon as possible to avoid it. Unfortunately, there may be a considerable risk with a number of security (eg. Sophos and Malwarebytes) and TSI network management tools not working and negatively impacting the security posture and network performance of your organization. In some cases, users may be…
ContinuedTSI Cyber Security: Apple’s Latest IOS Security Update
As part of this month’s security updates, we wanted to bring to your attention a number of critical Apple vulnerabilities impacting smartphone, iPad, Apple Watch and MacBook iOS to your attention: iOS 14.8 iPadOS 14.8 MacOS Bug Sur 11.6 WatchOS 7.6.2 If you or your team use these devices, we highly recommend that you routinely encourage them to regularly check for and apply the most recent updates for their Apple…
ContinuedWhat Microsoft’s Latest PrintNightmare Vulnerability Fix Has To Offer
Microsoft has since addressed the PrintNightmare vulnerability that impacts you and your team’s ability to print from your network without compromising your security posture. If TSI applies the latest Microsoft ‘fix’, users will be unable to print via the network, which would be a very serious issue for your organization. We understand your frustration with this problematic scenario, but we highly recommend that the PrintNightmare ‘fix’ be applied despite its…
ContinuedHow to Find Your NIST 800-171 & CMMC Requirements: A Comprehensive Guide to Determine Your Compliance Requirements from Your Primes & Clients
One of the most frequently asked questions I receive is: “How do I know if I need to be compliant with either the NIST 800-171 or CMMC frameworks?” The bottom line is that if you possess controlled unclassified information (CUI) then your organization will likely have to fulfill these compliance requirements- even if you are considered a commercial off the shelf (COTS) company if you’re required to do so by…
ContinuedSecurity Vulnerability: Microsoft’s PrintNightmare Remains Unpatched
As many of you may have heard, Despite Microsoft’s assertion that their latest update fixed last month’s PrintNightmare vulnerabilities, we’ve been informed that additional critical security issues remain that we wanted to bring to your attention. To learn more about how to safeguard your organization from the developing issue, please click here for the notification we sent to our clients detailing how to address it.
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
