AA20-345A: Cyber Actors Target K-12 Distance Learning Education to Cause Disruptions and Steal Data

Posted on Thursday December 10, 2020

date: December 10, 2020

Summary

This Joint Cybersecurity Advisory was coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC).

 

Security Update Guide: Let's keep the conversation going

Posted on Tuesday December 08, 2020

Hi Folks, We want to continue to highlight changes we've made to our Security Update Guide. We have received a lot of feedback, much of which has been very positive. We acknowledge there have been some stability problems and we are actively working through reports of older browsers not being able to run the new application. We really appreciate your feedback as we review these issues.

 

What's in store for Windows users in 2021?

Posted on Monday December 07, 2020

If you've been waiting for updates on Windows 10, here's some good news and more! Microsoft will very likely release big updates to the OS in 2021. Additionally, the tech giant is expected to introduce new services designed to maximize user experience across a wide range of devices.

 

How business intelligence can help small businesses

Posted on Monday December 07, 2020

Before, hiring specialists to analyze business data entailed costs that only large companies could afford. This was one of the reasons why small- and medium-sized businesses (SMBs) were hesitant to implement business intelligence (BI). But times have changed. SMBs now have access to a vast range of business tools that can improve data management processes. To stay ahead, SMBs should harness the capabilities of BI to develop effective business strategies using large volumes of data just sitting in their systems.

 

Two excellent ways to verify user identity

Posted on Wednesday December 02, 2020

A secure login process is an excellent way to protect your business from cybercriminals. When it comes to verifying user identity, you can choose between two-step authentication and two-factor authentication. Learn the difference between the two so you can have a better appreciation of your cybersecurity options. If you want to improve your business's cybersecurity, you should take a closer look at your authentication process. Two-step and two-factor authentication are two of the most commonly used authentication methods. Many businesses use the terms two-step and two-factor authentication interchangeably, but there are subtle differences between the two.

 

AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks

Posted on Tuesday December 01, 2020

date: December 1, 2020

Summary

This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CKĀ®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.

 

Page:   1...205206207208209210211212213...445

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016