Cyber Security
Windows 10 (v.21H2) – End of Life
Beginning June 13th, Windows 10 (v. 21H2) will be considered End of Life (EOL) and will no longer receive critical security patches. TSI started applying this update (v. 22H2) to workstations on Saturday, April 1st so they could continue receiving critical security patches and avoid the potential exploitation by vulnerabilities targeting non-updated machines. This updated was pushed to TSI clients during normal, prescheduled patching and maintenance windows, but for…
ContinuedProtect Your Systems from CVE-2023-23397: A Critical Vulnerability in Outlook
Earlier this week, our TSI Managed Services team addressed a critical vulnerability (CVE-2023-23397) impacting Outlook for our clients. Learn more about the vulnerability and how to protect your systems below. What is CVE-2023-23397 – the CVE impacting Outlook? Microsoft disclosed a critical vulnerability to Outlook called CVE-2023-23397 on March 14 as part of the March Patch Tuesday fixes. This vulnerability is considered a significant threat, with a rating of 9.8…
ContinuedCritical Veeam Backup Solution Vulnerability: How to Protect Your Data
What is the VEEAM vulnerability? Veeam, a backup data solution, has warned its customers to fix a severe security problem that affects its Backup & Replication software. This issue (CVE-2023-27532) was found in February by a security researcher named Shanigen and it affects all versions of Veeam Backup & Replication (VBR). The vulnerability allows people who aren’t authorized to access the software to get into the backup system by obtaining…
ContinuedNew Microsoft Multifactor Authentication (MFA) Method
At Technical Support International (TSI), we understand the importance of keeping your personal and business data secure. That’s why Microsoft implemented a new Multifactor Authentication (MFA) method to help protect your accounts from unauthenticated access. What is Multifactor Authentication? Multifactor Authentication is a security feature that requires you to provide two or more forms of identification before accessing your account. With MFA, even if someone gets hold of your password,…
ContinuedDon’t Let The Recent OneNote Exploit Threaten Your Cybersecurity
We have noticed that malware threat actors have found an exploit within OneNote and we’ve observed a significant increase in the number of malicious files delivered and opened via OneNote email attachments. Unlike malicious Word and Excel files, OneNote malware and the associated infected files do not require the security prompt asking the end-user to allow macros, thus increasing the chances of unknowingly running the malicious executable. What you can do…
ContinuedThe #1 Top Cybersecurity Threat from 2022 & How to Protect Your Business in 2023
With 2023 now underway, we wanted to share what we believe to be the two most significant cybersecurity threats to your organization: Phishing attempts and users without routine end user cybersecurity awareness training. Every breach that we saw in 2022 from our clients was from phishing. Unfortunately, cyber threat actors are always one step ahead, and the way that email traverses from one server to another, is defined by standards…
ContinuedCategories
- Backup & Disaster Recovery
- Business Operations
- Case Studies
- Cloud Services
- Cyber Security
- Employee Spotlight
- Finance & Budgeting
- Glossary Term
- Governance & IT Compliance
- Managed Services
- Mobile Device Management
- Network Infrastructure
- NIST 800-171 & CMMC 2.0
- PCI
- Podcast
- Project Management
- TSI
- Uncategorized
- vCIO
Cyber Security Policy Starter Kit:
10 Critical Policies That Every Company Should Have in Place
