TIC Offers DUO for MFA Security
Duo Security is a leading multi-factor authentication (MFA) for the Workforce provider. Duo enables organizations to provide trusted...
Holiday Traveling with Personal Internet-Enabled Devices
Your smartphone, tablet, or other device is a full-fledged computer. It is susceptible to risks inherent in online transactions. When...
4 Tips to Keep Tech Cool this Summer
It's important to keep tech cool while the heat rises in the summer. Excessive heat can result in the failure of hardware components....
Internet Explorer 11 Desktop App Retirement FAQ
The future of Internet Explorer (“IE”) on Windows 10 is in Microsoft Edge. What does this mean for commercial organizations, IT admins,...
Weak Security Controls and Practices Routinely Exploited for Initial Access
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber...
Hackers Send Compainies USB Drive with Ransomware
The FBI is warning companies that hackers are mailing USB drives loaded with ransomware. They include letters purporting to be from The...
Apache Releases Log4j Version 2.15.0 to Address Critical RCE Vulnerability Under Exploitation
The Apache Software Foundation has released a security advisory to address a remote code execution vulnerability (CVE-2021-44228)...
Disable Print Spooler
CISA is recommending disabling the print spooler service on all computers that don't print. Read more here. https://us-cert.cisa.gov/nc...
New sophisticated email-based attack from NOBELIUM
Microsoft Threat Intelligence Center (MSTIC) Microsoft 365 Defender Threat Intelligence Team Microsoft Threat Intelligence Center (MSTIC)...