Cisco Releases Critical Patches for Millions of Phones, Routers, More

Cisco has released patches for not one, not two, not three but five high-risk vulnerabilities affecting potentially tens of millions of its devices. If left unaddressed, these exposures could allow remote attackers to take control of desktop phones, switches, routers, and even security cameras. Despite the massive assortment of possible targets, as of yet, there’s […]
Why You Need to Patch Your Windows 10, Server Instances ASAP

Heads up: Microsoft and the National Security Agency (NSA) just sounded the alarm on a newly-discovered Windows vulnerability, one that has left potentially hundreds of millions of devices open to attack. Designated CVE-2020-0601, it affects certificate validation within devices running Windows 10, Windows Server 2016, Windows Server 2019, and Windows Server version 1803. Essentially, attackers […]
Staying Safe in the Cloud: 6 Must-Have Conversations

Cloud has dominated technology conversations in recent years, a trend which shows no signs of reversing come the new year. In its 2020 State of IT Report, Spiceworks projects that hosted/cloud-based services will command nearly 29% of organizational IT budgets next year, a figure on par with 2019 totals. With organizations continuing to spend big […]
Cyber Insurance Gap May Leave Merck Hanging After NotPetya

During the summer of 2017, pharmaceutical giant Merck was one of countless companies, around the world hit by the most devastating cyber-attack in history: NotPetya. Initially masquerading as ransomware, NotPetya turned out to be far worse: a strain of malware designed to destroy systems rather than hold them hostage. The toll NotPetya inflicted on Merck […]
3 Factors (Besides Budget) That Promote Cyber Security Success

Here’s something we can all be thankful for this holiday season: Larger cyber security budgets are reportedly on their way! In a recent FireEye study, 76% of participants said they expect their security budgets to increase in 2020. That’s obviously encouraging for those fighting the good fight and bad news for those on the other […]
Why Phishing Campaigns Succeed - And How to Fight Back

Here’s an encouraging stat: Nearly all (99%) of email-based threats like phishing are totally harmless in and of themselves. In order to become dangerous, they require some type of user interaction, whether that’s clicking on a link, opening an attachment, etc. Yet, email remains a highly popular and lucrative attack vector. In fact, phishing ranks […]
8 Cyber Security Blind Spots that Could Cost SMBs Big

No entity, no matter the size, can afford cyber security blind spots. The recent string of ransomware attacks targeting local governments has underscored that point. Hackers have gone after major cities like Baltimore and they’ve hit places the average person is less familiar with, like Lake City, FL. Despite the risks, many small-to-midsized municipalities, businesses, […]
Microsoft as a Security Company? 6 Updates Behind the Cliché

Raise your hand if you’ve heard someone describe Microsoft as a “security company” at some point in the last few years. We can’t say for sure – maybe because your Microsoft desktop is so secure – but we’re guessing there are plenty of hands in the air. We get it. Given cyber security’s status as […]
Safety in the Cloud with Dell EMC Data Protection for VMC on AWS

Back in the spring, we wrapped up a months-long deep dive into the features and benefits of VMC on AWS. Along the way, we covered NSX integration and native tools, as well as the solution’s ability to power migration simplification and disaster recovery. However, a topic came up at our recent Arraya Solutions Tech Summit […]
When to Trust in TACACS+: 3 Use Cases

These days, everybody is looking for a cyber security silver bullet. Organizations want something flashy, new, and most importantly, capable of besting any threat or malicious actor that may cross its path. TACACS+ is none of those things. In truth, that perfect cyber security cure-all may never materialize. Instead, the most successful security postures use […]