Solorigate Resource Center – updated January 15, 2021

Posted on Tuesday December 22, 2020

Alongside our industry partners and the security community, Microsoft continues to investigate the extent of the recent nation-state attack on SolarWinds. Our goal is to provide the latest threat intelligence, Indicators of Compromise (IOC)s, and guidance across our products and solutions to help the community respond, harden infrastructure, and begin to recover from this unprecedented attack. As new information becomes available, we will make updates to this article at https://aka.ms/solorigate.   Executive Summary and Background Information  …

Solorigate Resource Center – updated January 15, 2021 Read More »

 

Solorigate Resource Center – updated February 2, 2021

Posted on Tuesday December 22, 2020

Alongside our industry partners and the security community, Microsoft continues to investigate the extent of the recent nation-state attack on SolarWinds. Our goal is to provide the latest threat intelligence, Indicators of Compromise (IOC)s, and guidance across our products and solutions to help the community respond, harden infrastructure, and begin to recover from this unprecedented attack. As new information becomes available, we will make updates to this article at...

 

Solorigate Resource Center – updated February 5, 2021

Posted on Tuesday December 22, 2020

Alongside our industry partners and the security community, Microsoft continues to investigate the extent of the recent nation-state attack on SolarWinds. Our goal is to provide the latest threat intelligence, Indicators of Compromise (IOC)s, and guidance across our products and solutions to help the community respond, harden infrastructure, and begin to recover from this unprecedented attack. As new information becomes available, we will make updates to this article at...

 

How to tell if an Android app is legit

Posted on Monday December 21, 2020

More and more people are relying on Android devices for remote work, which is why cybercriminals are taking advantage and creating counterfeit Android apps to try and misguide users. These apps typically collect users' sensitive data or infect devices with malware, which can lead to fraud and financial crimes. The problem is, even a tech-savvy user may struggle to identify these bad apps.

 

What you need to know about Mac ransomware

Posted on Friday December 18, 2020

New strains of ransomware usually impact many Windows users, while only a small percentage of Mac users get affected. However, there are ransomware strains that specifically target Apple's computers. Defending against these threats is crucial if your business mostly uses Macs. Here's what you need to know about Mac ransomware.

 

Data storage: HDD and SSD defined

Posted on Wednesday December 16, 2020

When purchasing new computers, buyers used to have limited choices when it came to what kind of storage they got with their laptop or desktop PCs. But nowadays you can configure your system with either traditional hard disk drives (HDDs), increasingly common solid state drives (SSDs), or in some cases both. Here's a comparison of both storage drives so you can figure out which best suits your needs.

 

Page:   1...109110111112113114115116117...350

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016