Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/11 October 2024’s Most Wanted Malware: Infostealers Surge as Cyber Criminals Leverage Innovative Attack Vectors (Check Point) Check Point’s Global Threat Index for October 2024 reveals a concerning trend in the cyber security landscape: the rise of infostealers and the increasing sophistication of attack methods employed by cyber criminals. https://blog.checkpoint.com/security/october-2024s-most-wanted-malware-infostealers-surge-as-cyber-criminals-leverage-innovative-attack-vectors/... read more.

  • November 15, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 11/4 How to Enroll an iOS 18 Device in Intune Older versions of iOS continue to support the older enrollment method and the device can be successfully upgraded to iOS 18. However, if the user unenrolls the device, re-enrollment will need to be done with the newer enrollment method. https://www.gothamtg.com/blog/ios-18-mobile-device-management-enrollment Why SIEM Is Not Right for SaaS Security (Arctic Wolf) Automating data collection, aggregation, and analysis from all the security tools sounds l... read more.

  • November 08, 2024

By Ed Bratter, Posted in Infrastructure, Support

Many look forward to the Fall when Apple releases its newest version of iOS with the new features and toys it presents. One of this year’s improvements offers a vastly simplified process for enrolling personal (BYOD) devices into a mobile device management (MDM) solution such as Intune. The current method requires installing both the Company Portal and the Microsoft Authenticator app, and requires a dance through a maze of screens and jumping between applications to successfully enroll a dev... read more.

  • November 04, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/28 Reflecting on 15 Years of Pure Storage (Pure Storage) October 2024 marks the 15th anniversary of Pure Storage. From the start, we’ve been in it for the long haul to disrupt the enterprise storage industry. We continue to deliver innovation that will help eliminate complexity and make our customers’ lives easier. https://blog.purestorage.com/news-events/reflecting-on-15-years-of-pure-storage/ A Closer Look at Q3 2024: 75% Surge in Cyber Attacks Worldwide (Check Point) In Q3 2024... read more.

  • November 01, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/21 Unraveling Cyber Defense Secrets: Strategies for Defending Against Credential Harvesting (Adlumin) With more logins to manage than ever, it’s easy to see why people reuse passwords or turn to tools like single sign-on (SSO). However, this can create a single point of vulnerability—if one password is compromised, it could grant access to multiple systems. https://adlumin.com/post/unraveling-cyber-defense-secrets-strategies-for-defending-against-credential-harvesting/ Cloud Loggin... read more.

  • October 25, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 10/7 What’s New in Citrix Workspace App: Security, Speed, and Experience (Citrix) The Citrix Workspace app is designed to provide users with a secure, easy-to-install client that delivers instant access to business-critical applications, desktops, and data from any device. As the first touchpoint it’s a key component to ensure secure access to your users and also essential for employee productivity. https://www.citrix.com/blogs/2024/10/01/whats-new-in-citrix-workspace-app-security-spee... read more.

  • October 11, 2024

By Kamran Ahmad, Posted in Infrastructure, Support

This blog contains contributions from Technical Architect, Kamran Ahmad, and System Engineer Level 1, Doug Lampone. We recently assisted a client with a Microsoft OneDrive issue where users were not automatically signed into OneDrive through Azure RemoteApp or Azure Virtual Desktop. The client's resources were hosted on Windows 11 version 22H2 running OneDrive 24.166.0818.0003. To come up with a solution to this problem, we worked with Microsoft support and captured logs. We found the follow... read more.

  • October 07, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/30 Hybrid cloud environments are not safe from ransomware (ThreatDown) The preferred way to move laterally from on-premises systems to cloud environments are stolen credentials for accounts that have access to both. They use the stolen credentials to gain control of the network, eventually creating persistent backdoor access to the cloud environment, and deploying ransomware to on-premises systems. https://www.threatdown.com/blog/hybrid-cloud-environments-are-not-safe-from-ransomware/ The Dange... read more.

  • October 04, 2024

By Timothy Karl, Posted in Infrastructure

Microsoft Purview has been gaining significant attention lately as more organizations recognize the growing importance of data governance, security, and compliance. As businesses adapt to an increasingly digital landscape, the need for efficient data management and protection has become a top priority. If your organization uses Microsoft 365, it’s worth understanding how Microsoft Purview can help you manage sensitive data and ensure compliance. This blog provides an overview of what Purview is, while... read more.

  • October 02, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/23 Understanding the Roles in the Ransomware-as-a-Service Ecosystem: Who’s Targeting Your Data Security Gaps (Bitdefender) Ransomware criminal organizations are now working like streamlined software companies and service providers, with several key roles facilitating this efficient operation. https://www.bitdefender.com/blog/businessinsights/understanding-the-roles-in-the-ransomware-as-a-service-ecosystem-whos-targeting-your-data-security-gaps/ New Phishing Campaign Exploiting Google App... read more.

  • September 27, 2024