Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/7 What’s New in Citrix Workspace App: Security, Speed, and Experience (Citrix) The Citrix Workspace app is designed to provide users with a secure, easy-to-install client that delivers instant access to business-critical applications, desktops, and data from any device. As the first touchpoint it’s a key component to ensure secure access to your users and also essential for employee productivity. https://www.citrix.com/blogs/2024/10/01/whats-new-in-citrix-workspace-app-security-spee... read more.

  • October 11, 2024

By Kamran Ahmad, Posted in Infrastructure, Support

This blog contains contributions from Technical Architect, Kamran Ahmad, and System Engineer Level 1, Doug Lampone. We recently assisted a client with a Microsoft OneDrive issue where users were not automatically signed into OneDrive through Azure RemoteApp or Azure Virtual Desktop. The client's resources were hosted on Windows 11 version 22H2 running OneDrive 24.166.0818.0003. To come up with a solution to this problem, we worked with Microsoft support and captured logs. We found the follow... read more.

  • October 07, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/30 Hybrid cloud environments are not safe from ransomware (ThreatDown) The preferred way to move laterally from on-premises systems to cloud environments are stolen credentials for accounts that have access to both. They use the stolen credentials to gain control of the network, eventually creating persistent backdoor access to the cloud environment, and deploying ransomware to on-premises systems. https://www.threatdown.com/blog/hybrid-cloud-environments-are-not-safe-from-ransomware/ The Dange... read more.

  • October 04, 2024

By Timothy Karl, Posted in Infrastructure

Microsoft Purview has been gaining significant attention lately as more organizations recognize the growing importance of data governance, security, and compliance. As businesses adapt to an increasingly digital landscape, the need for efficient data management and protection has become a top priority. If your organization uses Microsoft 365, it’s worth understanding how Microsoft Purview can help you manage sensitive data and ensure compliance. This blog provides an overview of what Purview is, while... read more.

  • October 02, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/23 Understanding the Roles in the Ransomware-as-a-Service Ecosystem: Who’s Targeting Your Data Security Gaps (Bitdefender) Ransomware criminal organizations are now working like streamlined software companies and service providers, with several key roles facilitating this efficient operation. https://www.bitdefender.com/blog/businessinsights/understanding-the-roles-in-the-ransomware-as-a-service-ecosystem-whos-targeting-your-data-security-gaps/ New Phishing Campaign Exploiting Google App... read more.

  • September 27, 2024

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In today’s digital age, where cyberthreats are constantly evolving, establishing and maintaining an enterprise process for the workforce to report security incidents is crucial. A streamlined and well-publicized process ensures that incidents are reported promptly and accurately, allowing the organization to respond swiftly and mitigate potential damage. This blog outlines the key components of an effe... read more.

  • September 24, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/16 Defending Against Attacks on Data with Rubrik and the CrowdStrike Falcon Platform (Rubrik) Organizations need a comprehensive view of both the threats targeting them and the data they are defending. This holistic perspective allows them to identify attacks targeting their data and prioritize their responses accordingly. https://www.rubrik.com/blog/technology/24/9/defending-against-attacks-on-data-with-rubrik-and-the-crowdstrike-falcon-platform Ransomware review: September 2024 (ThreatDown) ... read more.

  • September 20, 2024

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the world of cybersecurity, a swift and coordinated response to security incidents is crucial. Central to this response is having up-to-date contact information for all parties that need to be informed. From internal staff to third-party vendors, law enforcement, and beyond, knowing whom to contact and how to reach them can make a significant difference in mitigating the impact of a security breach. This... read more.

  • September 17, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/9 Move to Azure Virtual Desktop—The Right Way (Nerdio) The first rule of AVD migration? Plan ahead. We can’t stress this enough. Rushing into a migration without a solid game plan is a recipe for disaster. https://getnerdio.com/resources/move-to-azure-virtual-desktop-the-right-way/ What Key Cyberthreats Do Small Businesses Face? (Bitdefender) Small businesses owners not only have limited resources to defend against cyberattacks, they also typically lack the time and knowledge to ke... read more.

  • September 13, 2024

By Bert Amodol, Posted in Security

Understanding Infant Digital Privacy: A Growing Concern in the Digital Age In today’s digital world, the concept of privacy has evolved beyond traditional boundaries. One of the most pressing issues emerging from this evolution is a new concept to me, "infant digital privacy." Although infants themselves are not interacting with digital technologies directly, their personal data is increasingly being collected, shared, and sometimes exploited. As parents and caregivers, it’s essential to unders... read more.

  • September 12, 2024