by Mike Foster | Jan 13, 2021 | Alerts, Best Practices, Cybersecurity, Executives and IT, IT Best Practices
Will running one rarely used program stop future attacks? It will in the SolarWinds attack and perhaps stop future compromises too. It makes sense that malware uses strategies to infect and hide inside of networks undetected. Here is some fascinating insight into that...
by Mike Foster | Jan 7, 2021 | Alerts, Best Practices, Cyber Security
Even if you don’t use SolarWinds, your suppliers and customers might. In some cases, your security is only as good as their security. There are so many webpages about the Solar Winds attack. Here are three of the most useful. Please forward this to your IT team....
by Mike Foster | Dec 30, 2020 | Alerts, Email Security, IT Best Practices, Technology Tips
The investigation into the SolarWinds breach keeps revealing more shocking ways attackers infiltrated organizations. Even if your organization doesn’t use SolarWinds, you must take action. Official channels report that some software giants, including at least...
by Mike Foster | Dec 15, 2020 | Alerts, CCleaner, Cyber Security, Executives and IT, Infection Vector, IT Best Practices, IT Risk Management, Security Breach, SolarWinds
Bad Actors compromised a product called SolarWinds Orion and then used that as a vector attack organization. Ask your IT team if they use SolarWinds products, and if so, they must visit SolarWinds dot com/security advisory immediately for more information. SolarWinds...