AA20-304A: Iranian Advanced Persistent Threat Actor Identified Obtaining Voter Registration Data

Posted on Friday October 30, 2020

date: October 30, 2020 | Last revised: November 3, 2020

Summary

This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CKĀ®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor techniques.

 

Attacks exploiting Netlogon vulnerability (CVE-2020-1472)

Posted on Thursday October 29, 2020

Microsoft has received a small number of reports from customers and others about continued activity exploiting a vulnerability affecting the Netlogon protocol (CVE-2020-1472) which was previously addressed in security updates starting on August 11, 2020. If the original guidance is not applied, the vulnerability could allow an attacker to spoof a domain controller account that could be...

 

Is your business continuity plan doomed to fail?

Posted on Wednesday October 28, 2020

No business continuity plan is perfect. Each plan has risks that can result in your business's failure if not taken into account from the start. But don't blame it all on your managed IT services provider (MSP) - often, a system's design has loopholes to start with. Let's take a look at some of the reasons why business continuity plans fail.

 

AA20-302A: Ransomware Activity Targeting the Healthcare and Public Health Sector

Posted on Wednesday October 28, 2020

date: October 28, 2020 | Last revised: November 2, 2020

Summary

This advisory was updated to include information on Conti, TrickBot, and BazarLoader, including new IOCs and Yara Rules for detection.

 

How to back up your files using Windows 10

Posted on Monday October 26, 2020

Business owners are becoming more aware of the damaging effects of data loss. Companies now realize that without safe and reliable data backup, important business information can fall into the wrong hands or be lost forever. Fortunately, Windows 10 offers easy-to-use tools like File History and OneDrive.

 

What does proactive cybersecurity entail?

Posted on Friday October 23, 2020

Most managed IT services providers (MSPs) promise "proactive" cybersecurity consulting. All businesses embrace the idea of preventing cyberattacks and data breaches before they happen, and MSPs themselves would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it's not always clear what proactive cybersecurity entails, so let's take a minute to go over it.

 

Page:   1...114115116117118119120121122...350

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016