Cyber Security
Russia/ukraine Conflict & the Potential Impact to Your Organization’s Cybersecurity Posture
As Russia began its invasion of Ukraine, there’s been a noticeable increase of cyber-attacks on organizations worldwide. The Russian State-Sponsored cybersecurity offensive isn’t aimed specifically at Government agencies or Defense contractors, but small companies like yours. As your cybersecurity partner, we implore you to take these threats seriously. The Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) have warned organizations to be…
ContinuedWindows 10 Version 20H2 To Reach End of Life
We’ve begun applying the Microsoft Windows 10 update (v. 21H2) for our clients so that their workstations continue receiving critical security patches and avoid the exploitation of this pending vulnerability. The patching process should happen during normal pre-scheduled time windows unless otherwise instructed. If you’re not working with TSI, we highly recommend that you reach out to your IT provider or staff to begin working on this as soon as…
ContinuedSophos Central Extends Support to Windows EOL Operating Systems
Microsoft has announced that effective February 1, 2022, it will no longer provide virus updates for the following end-of-life operating systems without the purchase of Sophos extended support. Server 2008 Windows 7 Linux CentOS 6 Linux CentOS 8 Linux Ubuntu 20.10 Linux Ubuntu 16.4 LTS Linux Ubuntu 12.4 Linux Redhat 6.8 Mac OS 10.14 Organizations that have a number of unsupported EOL systems will be impacted by this upcoming change.…
ContinuedWhat To Do: Apache’s Log4j Vulnerability
Apache’s Log4j is a powerful open-source logging library used by millions of developers worldwide. However, Apache recently discovered an extremely dangerous vulnerability that could leave your applications and servers vulnerable to attack! In this blog post, we will explain what the Log4j vulnerability is, and how you can protect your organization from being exploited. We will also provide instructions on how to upgrade your Log4j installation. So don’t wait –…
ContinuedJonas: Target of a Security Breach
We wanted to bring to your attention that Jonas has recently been the target of a security breach. The breach appears not to pose any immediate risk at present, but it may become an issue down the road, so we’re proactively reviewing updates from JONAS to address the potential impact. In short, we wanted to take the opportunity to address any potential concerns you currently may have and inform you…
ContinuedGoDaddy’s Data Breach Exposes 1.2M Customers
There has been a data breach involving 1.2 million GoDaddy customers that we would like to bring your attention to. This breach has only impacted organizations using GoDaddy’s Managed WordPress service, so if your organization subscribes to this service, it’s absolutely critical that you work with your website administrator to reset your passwords as soon as possible to avoid any further data loss or exposure to your site. GoDaddy disclosed…
ContinuedCategories
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
