dcsimg

How to Clean Up After a Failed Hyper-V Checkpoint

This article explains the formation of Hyper-V's lingering checkpoints and how to safely clean them after a failed checkpoint Read the post here: How to Clean Up After a Failed Hyper-V Checkpoint … [Read more...]

Ensuring Secure File Transfers from Mobile Devices

Like it or not, today’s world is a connected one, and data is shared at an alarming rate between mobile device users, company networks, and cloud services (including social networks). … [Read more...]

Dutch ISP Ziggo demonstrates how not to inform your customers about a security flaw

“Can you have a look at this email I got, please?” my brother asked. “It looks convincing enough, but I don’t trust it,” he added and forwarded me the email he received from Ziggo, his Internet Service Provider (ISP). Shortly after, he informed me that despite its suspicious aura, he found confirmation that the email was, in fact, legitimate. In the suspect email, the Dutch ISP informed … [Read more...]

How Do You Help Customers Keep Important Documentation?

As companies invest in their digital transformation, document management is an essential area of attention. From customer records and corporate documents to tax information and financial statements, today’s businesses face a deluge of paperwork that’s significantly more cost-efficient to move to their digital infrastructure. Read More … [Read more...]

Do you need to learn PowerShell? And how should you learn it?

When I talk to our MSP partners about using automation in their RMM platform, I often hear comments like: “But we don’t have any scripting/coding experience. We can’t do this.” This isn’t 100% accurate with the SolarWinds MSP platforms, as Automation Manager takes a lot of the coding away. You only need to understand the basics of scripting.  Read More … [Read more...]

August 2020 Patch Tuesday—No Emergencies but Plenty to Review

This Patch Tuesday follows the 2020 trend of 100+ vulnerabilities, but unlike last month, no major alarm bells to sound. August brings us fixes for 120 unique vulnerabilities, with 17 of them listed as “Critical,” with 97 listed as “Important.” Only a handful are listed as “Low” or “Moderate.” There are, however, a few listed as “Exploitation More Likely,” and one is listed as “Exploitation … [Read more...]

Thycotic Named to Inc. 5000 for Eighth Consecutive Year

Washington, DC., August 12, 2020 – Thycotic, a provider of privileged access management (PAM) solutions to more than 10,000 organizations worldwide, including 25 of the Fortune 100, announced today that the company has been named to the Inc. 5000 list of fastest growing private companies in America for the eighth consecutive year. Inc. Magazine has recognized Thycotic’s strong business growth and … [Read more...]

What are DCSync and DCShadow Active Directory attacks?

As you probably know already, a domain controller is a server that responds to security authentication requests within a Windows Server domain. A DC will host the Active Directory Domain Services (AD DS) database, which is used to manage users and computers and authenticate them to other services on the same domain. Both DCSync and DCShadow attacks are what are referred to as “late-stage … [Read more...]

Microsoft’s August 2020 Patch Tuesday Addresses 120 CVEs (CVE-2020-1337)

Microsoft patched 120 CVEs in August, marking the sixth month in a row of addressing over 100 CVEs Microsoft, for the sixth month in a row, patched over 100 CVEs in the August 2020 Patch Tuesday release, including 17 CVEs rated critical. For the first time in three months, this update includes patches for two vulnerabilities that were observed being actively exploited in the wild. This month’s … [Read more...]

The skinny on the Instacart breach

The COVID-19 outbreak has affected many facets of our lives—from how we visit our families, socialize with friends, meet with colleagues, to how we should be conducting ourselves outside of our homes. Ideally, a few meters apart from everyone else and with a mask on. These—on top of imposed lockdowns—have pushed most people to stay indoors, pushing them to do almost everything they want to do … [Read more...]