Cyber Security
Vulnerable Software: A 17-Year-Old Vulnerability Was Just Discovered in Windows Server
Meet SIGRed First “discovered” in July of 2020, SIGRed is a very particular type of vulnerability in the Windows DNS Server environment called an RCE, or remote code execution. This means that it can be triggered by an attacker with little more than a malicious DNS response. Believe it or not, it’s actually been around for 17 years and impacts all Microsoft O/S from Server 2003 all the way up…
ContinuedHow to Web Conference Safely: Cybersecurity Risk Management
Over the last few weeks, more and more of our clients at TSI have quickly become comfortable with video and web conferencing solutions like Zoom – which is terrific. Still, we wanted to take this opportunity to remind you to stay up-to-date on all of the scams and vulnerabilities that are associated with these platforms, many of which are growing more common by the day. So many of these communications…
ContinuedProtecting Yourself Online: How to Beat Covid-19 Scammers
According to data recently released by the Federal Trade Commission, consumers have already lost about $5.85 million to various Coronavirus related schemes ALONE and likely don’t include those that haven’t been reported to the agency. With a costly $600 average loss per instance, it’s a seemingly lucrative tactic that does not appear to be going away. Unfortunately, it should come as no surprise that there is no shortage of malicious actors…
ContinuedProtecting Against IoT Vulnerabilities: IoT Security Solutions in 2020
As someone who has been in the technology business for over 25 years, it’s safe to say that I’ve seen a lot of so-called tech trends come and go. But one that I find truly exciting is also one that is very much here to stay: IoT, also known as, the Internet of Things. In no uncertain terms, the implications of IoT are enormous. We’re already seeing them play out…
ContinuedCybersecurity Risks: New CISA Recommendations Following Recent Iran Hostilities
Due to recent events surrounding the increased hostilities between the Islamic Republic of Iran and the United States, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a notification outlining their recommendations to safeguard against a potential state-sponsored cyber-attack. The notification contains the following recommendations: 1. Adopt a state of heightened awareness. This includes minimizing coverage gaps in personnel availability, more consistently consuming relevant threat intelligence, and making sure emergency…
ContinuedTypes of Security Penetration Testing: Internal, External, & Whatever Your Organization Needs
Coming from a family that has been proudly serving the greater Boston area with innovative, technology-based solutions since 1989, a big part of my life involves staying up-to-date on everything going on in the IT space. When I’m not fielding calls with potential clients or helping existing ones better accomplish their long-term goals, I’m pouring over articles and other resources about the latest tips, tricks, trends and best practices that…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- CMMC
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST/CMMC
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place