The CISA has, as of January 2020, released an emergency directive that focuses on some critical vulnerabilities affecting all Windows systems, Windows CryptoAPI, Windows Remote Desktop Gateway (RD Gateway), and Windows Remote Desktop Client.
CISA, the Cyber Security and Infrastructure Security Agency, has issued a warning to Pulse Secure customers urging them to patch the 2019 Pulse Secure VPN vulnerability, CVE-2019-11510. The vulnerability is being exploited in real world attacks. In this post, we will outline the type of vulnerabilities discovered in these products, and why these issues leave a company particularly vulnerable.
With the current threat landscape the way it is, it is essential that business owners do what they can to protect their data. A critical part (but not the only part) of this is to back it up. Today, we will take a look at data backup and explain how it has to be an essential part of your business’ cyber security strategy.
Cyber crime has been on the rise over the last few years, and it doesn’t look like it will be slowing down anytime soon. As it turns out, bad actors can turn a profit by targeting businesses, and their tools and tactics are only getting trickier.
Are you one of those people that are able to stay healthy for long periods of time and then take your health for granted by ignoring minor health issues? Before long an ignored problem can become a major health issue.
Complacency, or sheer laziness...
Cyber security should be one of your top priorities when it comes to your business. Data breaches can come unexpectedly at any time, and the results can be disastrous. Here are four common mistakes to avoid.
Mobile devices have become a staple in contemporary life, with more business uses added regularly. Unfortunately, this makes them a more enticing target for cyber criminals to go after. To help you keep your phone secure, we’ve assembled a brief list...
Security threats are commonplace in the business environment, as any organization that turns a profit is sure to hold valuable data that is of use to criminals.
Some people have an easier time identifying threats than others, but with so many...