Microsoft addressed 139 Common Vulnerabilities and Exposures (CVE’s) this month, four which were marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft Vulnerabilities: …
Security & Threat Updates – June 2024:
Microsoft addressed 49 Common Vulnerabilities and Exposures (CVE’s) this month, one which was marked as a zero-day vulnerability. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft …
Security & Threat Updates – May 2024:
Microsoft addressed 60 Common Vulnerabilities and Exposures (CVE’s) this month, three of which were marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft …
Security & Threat Updates – April 2024:
Microsoft addressed 149 Common Vulnerabilities and Exposures (CVE’s) this month, two of which were marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft …
Security & Threat Updates – March 2024:
During the month of March 2024, Microsoft has identified 61 vulnerabilities in their current OS. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: *There are 0 Windows …
End-of-Life for Cisco Umbrella Roaming Client effective April 2, 2024
Cisco has announced Umbrella’s end-of-life effective April 2, 2024, and is advising that customers migrate to Cisco Secure Client, a solution with similar capabilities. Would you like to see a more holistic alternative?
Fortifying Your Brand – The Essential Guide to Enterprise Social Media Security
Social media platforms, while essential for marketing and customer engagement, are also attractive targets for cybercriminals. A breach can lead to unauthorized posts, resulting in reputational damage, loss of sensitive …
Security & Threat Updates – January 2024:
During the month of January 2024, Microsoft has identified 48 vulnerabilities in their current OS. The most critical CVE’s are noted below: *There aren’t any actively exploited or publicly disclosed …
Unwrapping DMARC: The Gift of Secure Email Communication This Holiday Season
by Chuck Mackey and Will Hudec What is DMARC? DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a powerful email authentication protocol designed to protect your email domain from being …
The Uptick in Ransomware Attacks on Healthcare: Strengthening Cybersecurity for Patient Safety
by Will Hudec In recent months, the healthcare sector has witnessed a concerning surge in cyberattacks, particularly ransomware attacks. These malicious acts pose a significant threat to patient care, data …
5 Reasons Resilience Beats Compliance
Cyber-attacks are increasing in frequency, sophistication, and severity. They’ve increased 38% from 2021 to 2022 and hit an all-time high in Q4 2022 (Check Point Research, 2023). With so many …
Cybersecurity Lessons from Sun Tzu’s “The Art of War”
According to legend (or fact, depending on who you believe), Sun Tzu was a Chinese general, writer and strategist that lived in the 5th or 6th century B.C. He is credited as …