Posts for category: Best Practices Weekly Summaries

Strengthening IoT Security

The IoT Threat The Internet of Things (IoT) is growing rapidly with each new product cycle and presents serious cause for concern with regards to information security.  Over the last several ...

Protecting Against Data Destruction Attacks

Olympic Destroyer Recently, a string of cyber attacks disrupted services and caused a multitude of IT-related issues at the Winter Olympics in PyeongChang.  While who is behind the attacks ...

Spectre and Meltdown: What You Need to Know and How to Protect Yourself

What are Spectre and Meltdown? [caption id="attachment_6961" align="alignright" width="400"] Source: Gizmodo[/caption] Earlier this year security researchers made public the discovery of ...

Trouble in Paradise: Hawaii Emergency Mismanagement

[caption id="attachment_6897" align="alignleft" width="225"] Source: Wired[/caption] On Saturday January 13, 2018, people in the Hawaiian islands found themselves in the midst of a large-scale ...

Defense Strategy for BYOD Networks

  [caption id="attachment_6777" align="alignright" width="300"] Source: Xyfon Managed IT[/caption]   Bring your own device (BYOD) is a trend that has grown increasingly common over the ...

Critical macOS High Sierra Root Flaw

This week, a critical and baffling vulnerability has been discovered lurking within macOS High Sierra that allows users to gain full access (root) to your Mac without a password or any type of ...

How to Fix Improper Application of ASLR

Recently, it has been reported that Windows 8, 8.1 and 10 fail to properly implement ASLR. Address Space Layout Randomization (ASLR) is a security technique used to prevent the exploitation of memory ...

Huge Flaw Discovered in Microsoft Office

In this month’s Patch Tuesday, Microsoft patched a massive vulnerability affecting all Microsoft Office versions released in the past 17 years that allows for malicious code execution. The ...

New Windows 10 Standards for Secure Devices

Earlier this week, Microsoft published an article detailing the new Windows 10 standards consumers should follow to have a secure device, specifically for the Fall Creators Update. The standards ...

Cryptocurrency Mining

Recently, there have been reports of different websites leveraging their user’s browsers to mine cryptocurrencies. Researchers at AdGuard decided to try and evaluate the scale and impact of this ...