AA22-055A : Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks

Posted on Thursday February 24, 2022

date: February 24, 2022

Summary

Actions to Take Today to Protect Against Malicious Activity
* Search for indicators of compromise.
* Use antivirus software.
* Patch all systems.
* Prioritize patching known exploited vulnerabilities.
* Train users to recognize and report phishing attempts.
* Use multi-factor authentication.

 

5 Ways your business can benefit from dashboards

Posted on Wednesday February 23, 2022

Data dashboards have become increasingly popular for businesses. These data visualization tools give you an overview of how your business is performing, and they cater to a wide variety of users, from marketing staff to project managers. Let’s take a look at how dashboards can support your business activities.

 

Windows 11 settings you should turn off

Posted on Monday February 21, 2022

Do you feel like your online activity is being spied on? That’s because it probably is — but not by cybercriminals as you might think. It’s more likely that it’s your operating system that's tracking your information. Learn more about Windows 11’s not-so-private settings and how to fix them to ensure your privacy.

 

Understanding fileless malware

Posted on Friday February 18, 2022

Though fileless malware has been around much longer, it only became a mainstream method of cyberattack in 2017. With fileless malware, cybercriminals are able to use legitimate tools and services, such as existing software, applications, and authorized protocols, to carry out malicious activities like unauthorized data retrieval or data damage. Left unchecked, these types of malware can adversely affect your business processes and the infrastructures that run them.

 

What to consider when picking a health app or wearable tech

Posted on Wednesday February 16, 2022

Wearable tech and mobile apps are great examples of innovations that significantly improve patient care. As a healthcare provider, you’ve likely had patients ask you about which healthcare apps and wearable technology they should be using. Here are the things you need to consider when making a recommendation.

 

AA22-047A: Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology

Posted on Wednesday February 16, 2022

date: February 16, 2022

Summary

Actions to Help Protect Against Russian State-Sponsored Malicious Cyber Activity:
• Enforce multifactor authentication.
• Enforce strong, unique passwords.
• Enable M365 Unified Audit Logs.
• Implement endpoint detection and response tools.

 

Page:   1...666768697071727374...350

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016