AA21-131A: DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks

Posted on Tuesday May 11, 2021

date: May 11, 2021 | Last revised: May 20, 2021

Summary

This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the...

 

Hardware management checklist for SMBs

Posted on Friday May 07, 2021

Regular maintenance and continuous monitoring are key to making sure your hardware runs optimally. These tasks usually fall on IT staff, but by following these tips, you can help your IT team prolong the life of your computer equipment.

 

What you need to know about VoIP phone systems

Posted on Wednesday May 05, 2021

While many businesses are already using Voice over Internet Protocol (VoIP) phones to connect with their customers and other stakeholders, some still depend on traditional telephone systems to get the job done. This is because many organizations aren't aware of the crucial gains in productivity and efficiency that come with internet phones. If you’re still not convinced about deploying VoIP, read this quick guide.

 

Microsoft 365 security pain points and how to solve them

Posted on Monday May 03, 2021

Many businesses prefer Microsoft 365 not only because of its powerful features and cost-saving benefits, but also because of its world-class security. However, the cyberthreat landscape is constantly evolving, so using this suite of cloud-based tools and services will always come with security challenges. Fortunately, Microsoft is continuously looking for ways to address these issues to ensure that your environment and data are protected.

 

How does the human cloud benefit SMBs?

Posted on Friday April 30, 2021

If the prevalent image of a startup is a couple of guys in a garage (think Amazon, Apple, Microsoft), the emerging picture of the workforce of the future consists of skilled talents collaborating in the cloud. Thanks to the human cloud, small- and medium-sized businesses (SMBs) can now eliminate the barriers associated with traditional workspaces and enjoy cost-effective solutions.

 

“BadAlloc” – Memory allocation vulnerabilities could affect wide range of IoT and OT devices in industrial, medical, and enterprise networks

Posted on Thursday April 29, 2021

Microsoft’s Section 52, the Azure Defender for IoT security research group, recently uncovered a series of critical memory allocation vulnerabilities in IoT and OT devices that adversaries could exploit to bypass security controls in order to execute malicious code or cause a system crash. These remote code execution (RCE) vulnerabilities cover more than 25 CVEs…

 

Page:   1...9293949596979899100...350

Celebrating 35+ Years

Managed Internet Connections

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016