6 Simple Rules for Securing Your Endpoints

6 Simple Rules for Securing Your Endpoints It’s never been more critical to manage and secure your endpoints. Here are six important rules for protecting your organization from IT security threats. 1. Always Be Patching Managing software updates—and specifically patching endpoints—secures your organization from known threats. The appearance of new endpoint types—such as Internet of…

Fake ‘Windows Update’ Installs Ransomware

Fake ‘Windows Update’ Installs Ransomware An executable file disguised as a Windows Update has been dropping the new Cyborg ransomware on its victims. You’ve Got Mail An executable file disguised as a Windows Update has been dropping the new Cyborg ransomware. The delivery mechanism claims to originate from Microsoft; however, it directs the victim to…

Worried about Cloud Security? Why On-Premise is More Dangerous

Worried about Cloud Security? Why On-Premise is More Dangerous ConnectWise is warning its customers that hackers are targeting its on-premise software to gain access to client networks and install ransomware. Attackers Targeting On-Premise Software Remote IT management solutions firm ConnectWise is warning its customers that hackers are targeting its on-premise software to gain access to…

Windows 10 1909 is Preparing for Release this Month

Windows 10 1909 is Preparing for Release this Month Microsoft is eagerly preparing Windows 10’s November 2019 Update for release in the coming weeks—the easiest and quickest Feature Update yet. What to Expect from the Windows 10 November Update Microsoft is eagerly preparing Windows 10’s November 2019 Update for release within the next few weeks.…

BlueKeep Attacks Arrive with Cryptomining Malware

BlueKeep Attacks Arrive with Cryptomining Malware The first wave of attacks exploiting the BlueKeep vulnerability have been detected by security researchers. What actions should your IT team take? The First BlueKeep Attacks Have Struck The first wave of attacks exploiting the BlueKeep vulnerability have been detected by security researchers; however, the flaw is not being…