The practical steps for conducting a data flow audit

The first few steps of your EU General Data Protection Regulation (GDPR)compliance project can be the most confusing. Where to start, who should be involved and how to meet all your obligations are just a few of the questions you will undoubtedly ask, and the entire process can seem incredibly daunting. Read more here Take your first steps in GDPR with Orthology! Call us today! … [Read more...]

Will Fake News Lead to the Next Cyber War?

Fake news is running rampant across all media outlets. While you may not take them seriously, these untrue news stories are playing with your emotions and have serious security implications. With over half the world’s population online and using social media, news travels fast. And sometimes the wrong news gets spread. What happens when it’s by our most trusted news source? How are readers able to … [Read more...]

Testing Puppet Code Using the Vagrant Provisioner

Vagrant is an excellent tool used for testing out applications deployments and scripts. It is lightweight, fast, and allows you to bring up environments quickly. Vagrant supplies several “provisioners” that allow boxes to be configured via shell script or using various configuration management solutions like Puppet, Ansible and Salt. … [Read more...]

Cloud Cost Management for AWS and Azure with WhatsUp® Gold

Metered cloud-billing isn't always as straight-forward as it seems. How do you keep track of cloud-spend and keep your resource usage efficient? … [Read more...]

How to Maximize Profitability in Your MSP Business

Maximizing profitability is something every business wants to do. In her recent webinar for the MSP Business Boot Camp, Tammy Allen, snr channel sales executive for SolarWinds MSP, identifies the areas of your business you can affect in order to help increase your profitability.  Read More … [Read more...]

GrayKey iPhone unlocker poses serious security concerns

Ever since the case of the San Bernadino shooter pitted Apple against the FBI over the unlocking of an iPhone, opinions have been split on providing backdoor access to the iPhone for law enforcement. Some felt that Apple was aiding and abetting a felony by refusing to create a special version of iOS with a backdoor for accessing the phone’s data. Others believed that it’s impossible to … [Read more...]

How Auditing Access Rights, States and Changes Helps Strengthen Security

According to an IBM Study, 60% of attacks come from inadvertent or malicious insider misuse. The importance of ensuring you’re able to keep track of what your most privileged IT users are doing cannot be understated. So, ensuring you have the appropriate means to track your most privileged users, and ensuring that granting of access rights is appropriate, should be a critical part of all IT … [Read more...]

Parallels RAS Team Attends Softline Day

The Parallels team had a great time presenting the comprehensive, user-friendly virtualization solution Parallels Remote Application Server (RAS) at Softline Day in Novosibirsk, Russia, on February 14, 2018. At the event, the Parallels team met with IT decision-makers and learned about the issues they face when trying to modernize their businesses and optimize IT costs. We also helped answer … [Read more...]

Zero Exposure Team Advisory: Micro Focus Operations Orchestration, Remote Denial-of-Service (DoS) Vulnerability

Tenable Research's Zero Exposure team just released an advisory for an information disclosure and denial-of-service vulnerability in Micro Focus Operations Orchestration software. This post provides further context around the discovered vulnerability. What do you need to know? Tenable Research's Zero Exposure team has discovered Information Disclosure and denial-of-service vulnerabilities in … [Read more...]

Hermes ransomware distributed to South Koreans via recent Flash zero-day

This blog post was authored by @hasherezade, Jérôme Segura and Vasilios Hioureas. At the end of January, the South Korean Emergency Response Team (KrCERT) published news of a Flash Player zero-day used in targeted attacks. The flaw, which exists in Flash Player and below, was distributed via malicious Office documents containing the embedded Flash exploit. Only a couple of weeks after … [Read more...]