508-909-5961 [email protected]

Windows 10 delivers comprehensive protection with built-in security features, including anti-virus firewalls and windows defender. The operating system also updates itself regularly to keep your security current and to continuously help safeguard against threats. Unfortunately, nothing is perfect, and Microsoft has announced some dangerous flaws hiding within Windows 10. But fret not, they’ve released patches […]

2016october27_windows_bWindows 10 delivers comprehensive protection with built-in security features, including anti-virus firewalls and windows defender. The operating system also updates itself regularly to keep your security current and to continuously help safeguard against threats. Unfortunately, nothing is perfect, and Microsoft has announced some dangerous flaws hiding within Windows 10. But fret not, they’ve released patches for them all, and we’ve got the details right here.

Internet Explorer

In its Windows 10 announcement, Microsoft clarified that it found four zero-day flaws, which are vulnerabilities that have never been seen before. Of the four, the most concerning is the one that allows cyberattackers to remotely take control of your machine with full administrative rights via Internet Explorer. All that is required to deploy the malware is visiting a website with the corresponding code.

Office

Microsoft Office also has a critical flaw that grants attackers the ability to corrupt memory and abuse privileges inherent to the user who opened the mischievous Office document. By amending how documents are saved and how code within a document is executed, Microsoft believes users will be much safer from email attachment schemes.

Exchange Server

For companies with on-premise servers, Microsoft Exchange Server patches need special attention. Without them, a malicious email could grant cyberattackers the ability to remotely insert and execute commands within the server. Patch MS16-108 provides cumulative updates and changes the way hotfixes and service packs are delivered. Lastly, it tries to ensure Microsoft Exchange Server follows a scheduled delivery model.

Microsoft Graphics

This security update for the Microsoft Graphics component of Windows 10 is considered ‘critical’ because of its presence throughout the entire operating system. Patch MS16-106 removes vulnerabilities in graphics processing protocols that would allow attackers to remotely control and exploit target systems.

If your desktops have not automatically updated themselves, users can trigger a manual update by opening the Settings window, selecting Update & Security, and finally Windows Update. Once there, simply select Check for Updates and follow the prompts to download and install the necessary updates.

Managing one machine is hard enough. If you're struggling to keep an entire office up and running, chances are you feel like you’re treading water in steel-toed boots. For total monitoring and maintenance of all your Windows machines, call us today -- we’ll throw you a lifeline and pull you aboard.

Published with permission from TechAdvisory.org. Source.

Read More

In the past, when small- and medium-sized business owners needed to connect computers located in separate workspaces, virtualization was one of the best options. However, the field of virtualization has evolved to accommodate the increasing popularity of virtual containers. These safer, more portable, solutions are equally accessible to both businesses that already utilize virtualization technology […]

2016october26_virtualization_bIn the past, when small- and medium-sized business owners needed to connect computers located in separate workspaces, virtualization was one of the best options. However, the field of virtualization has evolved to accommodate the increasing popularity of virtual containers. These safer, more portable, solutions are equally accessible to both businesses that already utilize virtualization technology and those looking to start fresh in the field of virtual computers. Regardless of which of those you are, let’s take a closer look at how containers work.

Why are containers so popular?

Before the introduction of containers, virtual workstations and servers allowed users to access computing power and software delivered across a local network or the internet. This technology took cloud computing and web hosting a step further than did just software on a website, and it created entire desktop experiences over the internet. However, it is a tad inefficient since running one small application still requires an entire hosted desktop.

Containers guarantee developers that their software will run smoothly, regardless of what type of computer their end user is running.

How containers improve on virtual desktops

Containers operate quite differently because they only package applications and their minimal requirements into a deliverable package. This makes it possible to deliver several containers to several different users with a significantly smaller footprint on the machine hosting the service.

There are a handful of pieces of software that create and deliver containers, and the most popular is Docker. Before the release of Docker, containers had existed for some time, but they were complicated and difficult to manage. With the rise of popularity in virtualization services, software vendors gained significant resources to make friendlier and simpler container solutions.

Although containers have made big improvements in enterprise computing, virtual machines still have a role to play in select circumstances. In both solutions, older equipment can be reappropriated to utilize much bulkier software hosted in the cloud. All you need is an internet connection, and an experienced IT professional to help you set it up. If you’re interested in either virtualization or accessing your applications in a container environment, please contact us today.

Published with permission from TechAdvisory.org. Source.

Read More

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people. Before you give up on […]

2016october25_security_bWhen it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people. Before you give up on understanding the variances between two-factor and two-step authentication, read this article to learn more so you have a fuller understanding of your cyber security.

If you are seeking out a way to improve your business's cyber security, both for your business itself as well as for your customers, you are likely looking at your authentication process. Two-step and two-factor authentication are two of the most commonly used options in cyber security. And in current cyber security, many businesses use the terms two-step and two-factor authentication interchangeably.

There are, however, subtle differences between the two. A two-step authentication process requires a single-factor login (such as a memorized password or biometric reading) as well as another of the same type of login that is essentially sent to the user. For example, you may have a memorized password for your first step and then receive a one-time-use code on your cell phone as the second step.

Two-step authentication does function to add an extra step in the authentication process, making it more secure than a single-step authentication (i.e. just the password). However, if a person or business is hacked, it will do only a little to stop hackers from getting a hold of whatever they are looking for.

On the other hand, there is two-factor authentication (sometimes referred to as multi-factor authentication), which is significantly more secure. This type of authentication requires two different types of information to authenticate. For example, it could be a combination of a fingerprint or retinal scan as well as a password or passcode. Because the types of information are different, it would require a hacker a great deal more effort to obtain both forms of authentication.

In essence, every two-factor authentication is a two-step authentication process, but the opposite is not true. With this information in mind, you can be certain that you are using the right type of authentication in your business to keep your business and customer information as secure as possible.

Your network needs the best security technology has to offer. What type of authentication that results in is just one of hundreds of choices that must be made to achieve that end. To take the stress out of securing and protecting your network, call us today for all the help you could ever ask for.

Published with permission from TechAdvisory.org. Source.

Read More

Cyber-crimes based on denial of services (DoS) attacks are nothing new. But of the businesses facing the threat of a DoS to their Voice over Internet Protocol (VoIP) system, most have no idea how to prevent this type of attack, or even why it’s being launched against them. If you’re one of those businesses, we […]

2016october24_voip_bCyber-crimes based on denial of services (DoS) attacks are nothing new. But of the businesses facing the threat of a DoS to their Voice over Internet Protocol (VoIP) system, most have no idea how to prevent this type of attack, or even why it’s being launched against them. If you’re one of those businesses, we have everything you need to know right here.

Denial of service attacks

The end goal of any DoS attack is to overwhelm a system with so many requests that the system is eventually forced to shut down. Telephony DoS (TDoS) attacks are a subcategory wherein these types of attacks are leveled at VoIP systems. Sadly, this security bulletin has jumped to the front of security concerns as a result of its use against hospitals and 9-1-1 phone lines.

In another depressing development, some TDoS attackers demand a ransom to halt the attack. Much like ransomware, with the help of cryptocurrencies and caller-ID spoofing, it’s incredibly difficult to identify attackers.

TDoS attacks generally employ fewer resources than the DoS attacks that are designed to cripple IT systems such as networks, servers, and software. At its most basic, all that a TDoS attack requires is an automated phone dialer that calls a target phone number and hangs up -- over and over. That very simple concept can stop anyone else from getting through the line.

What organizations need to do

Counterintuitive as it might sound, locking down your VoIP system with complicated and unnecessary security measures will ultimately do more harm than good. Most businesses can’t operate if they can’t communicate with their customers.

Although VoIP may be a digital resource similar to your other IT systems, the very nature of phone lines makes it impossible to hide them behind firewalls and other protections. However, there are new solutions that offer protection to VoIP systems. The new security protocols can protect your communication infrastructure against those who try to use force to gain access to your directory information. These protocols can also identify, reroute, and filter calls coming from known attackers.

If you’re experiencing any abnormalities with your VoIP system, or if you want to deploy the most up to date solution that the market has to offer, we have just the company in mind. With years of experience in the field, our expert staff is ready to help you at the drop of a hat -- just call today.

Published with permission from TechAdvisory.org. Source.

Read More