Technical Support: 412-349-6678 | Incident Response

Blog & Latest News

Secure your vulnerabilities - avoid becoming the April fool.

Avoid Becoming an April Fool by Securing Your Vulnerabilities

Securing any organization is hard. However, neglecting simple issues makes us foolish.From on-prem Exchange servers to SMS multifactor, some vulnerabilities can be self-inflicted and are easily resolved.Though teams may be short of bandwidth, some projects are too important to put off - even if it means outsourcing or putting aside...
Ransomware attack updates - Holiday season 2020

Ransomware attack hits computer giant, remains major threat

Earlier this month, Taiwanese computer giant Acer -- the world's 6th-largest PC vendor by unit sales, as of January 2021 -- was hit with a ransomware attack by the REvil gang, who is demanding a $50 million ransom.The largest ransomware attack ever announced, it serves as a reminder: Ransomware remains an enormous...
Is patching enough? We cover it here.

Is Patching Enough? What Further Steps You Need to Take

Previously, we discussed emergency Exchange patches promoted by Homeland Security involving four known zero-day vulnerabilities in on-premises Exchange servers. While it was suggested that organizations regularly check their servers for signs of malicious activity, an enormous surge in recent attacks requires more detailed and explicit warnings. This onslaught of ransomware...
On-prem or off-prem servers?

Could off-prem servers be on-point for you?

Recently, the Homeland Security’s Cybersecurity and Infrastructure Agency ordered other federal agencies to immediately update or physically disconnect on-premises (on-prem) Microsoft Exchange servers. Chinese hackers using active exploitation has driven the urgent need for action. In addition to Homeland Security’s order, Microsoft has also issued emergency out-of-band patches to address...
Accellion cyber security issues

Urgent Patches & Attacks, as Accellion Troubles Continue

New vulnerabilities and attacks emerge on a daily basis. IT professionals must be constantly aware and spread the word to their peers. We also must inform our non-technical colleagues so that they can avoid becoming victims themselves. The critical vulnerabilities covered here primarily target technical peers who apply the patches....