IT

This month there are 80 unique CVE’s, 2 exploited or disclosed and 3 public. The most pressing issues this month are CVE-2019-1214  and CVE-2019-1215. Both are elevation of privilege (EoP) vulnerabilities. These types of vulnerabilities are usually exploited by malware to gain the ability to...

With #GivingTuesday less than 3 months away (December 3, 2019), most nonprofits are gearing up for their year-end giving campaigns. Creating and managing a dedicated donation page for Giving Tuesday is a vital part of these fundraising campaigns. But how does your nonprofit ensure that it does not fall prey to bots that are always trying to make fraudulent transactions on your donation page? Let’s find out together.  Problem:  Fraudulent transactions are...

#ISSUE: Inadequate IT Infrastructure, Systems and Processes Biotech startups tend to focus all or a major portion their resources on R & D, clinical trials and advanced lab systems, letting their IT systems and infrastructure take a back seat not realizing how counterproductive or even fatal this misstep can...

This month there are 94 unique CVE’s, 0 exploited or disclosed. We pay close attention to CVE-2019-1181, CVE-2019-1182 – critical vulnerabilities very similar to ‘BlueKeep’ vulnerability and possibly wormable and CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9518 - denial of service vulnerability. CVE-2019-1181, CVE-2019-1182 A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services...

Attend the  Security Awareness - Closing the Gap webinar being hosted by ECHO Technology Solutions and learn how best to protect yourself from email threats, phishing attacks, ransomware attacks and much more. Date: August 21, 2019      Time: 10:00 A.M - 10:45 A.M. Registration Link: Security Awareness - Closing The Gap Speaker: Randy Hyshiver Agenda: Webinar...

In the last two blogs of our email security series we spoke about the critical role played by email threat protection and email continuity  in keeping an organization’s data secure and ensuring uninterrupted workflow when a breach does happen. But do you know what the biggest and most common cause of a security breach...