dcsimg

December 2019 – Microsoft Patch Tuesday

December is here already and ‘tis the season to be jolly – but not so jolly that we forget to stay vigilant and on guard against the attackers who want to send us the wrong kind of gifts. Unfortunately those who look for software vulnerabilities to exploit rarely take the holiday off, so it’s still […] … [Read more...]

Avast CCleaner Hit by Another Attack: What’s the Issue?

It's happened again, the Avast CCleaner application has been hit by another supply chain attack. This most recent supply chain attack should serve as an important security reminder for everyone. … [Read more...]

A VPN is NOT A Security Tool! It’s in the Name

  Some may argue that VPNs enhance security (encrypted connections etc.) but their core aim is privacy – it’s in the name – virtual private network. … [Read more...]

Third Party Patch Roundup  – November 2019

Here in the United States, November brings us falling leaves, cold fronts that drop the temperatures – sometimes precipitously – and Thanksgiving, a day of gratitude, family gathering, and eating lots and lots of turkey (at least in theory). Of course, November also brought its share of data breaches, malware infestations, and newly discovered vulnerabilities. […] … [Read more...]

Nine Holiday Security Tips for E-Commerce Retailers

The holidays just might be “the most wonderful time of the year” as the old-time carol says. But for IT security teams that oversee e-commerce websites, the holidays can also be “the scariest time of the year.” … [Read more...]

Explained: What is containerization?

Containerization. Another one of those tech buzzwords folks love to say but often have no idea what it means. A better way to organize children’s toys? The act of bringing tupperware out to dinner to safely transport home leftovers? Another name for Russian dolls? Containerization is, of course, none of those things. But its definition might be best captured in a quick example rather than … [Read more...]

Is the Internet of Things putting your business at risk?

The Internet of Things (IoT) isn’t only about cool consumer technologies such as Alexa-controlled light bulbs and Internet-accessible washing machines. Companies have embraced IoT in a big way, using it to gather information from a multiplicity of sources that enable better business decisions and enhance productivity. The IoT makes it possible to offer new services […] … [Read more...]

Kerio Control vulnerability fix

In today’s world of constant threats, data at rest isn’t the only data that needs to be protected with encryption. With the amount of data traversing the internet, the encryption of data in transit is just as important. Whether internet traffic or VPN traffic, data protection is crucial. Kerio Control VPN has always done a […] … [Read more...]

Using Powershell Authenticode Certificates to Self-Sign Application

One of the best ways to protect your servers and workstations from malware is to limit the execution of untrusted files. … [Read more...]

Who is to Blame in Wake of a Data Breach?

We like to assign blame. It seems it’s human nature to be totally knowledgeable in areas that don’t involve us at all. … [Read more...]