Todd HendrixAug 15, 20214 minPrint Nightmare!P r i n t N i g h t m a r e i s a c r i t i c a l r e m o t e c o d e e x e c u t i o n ( R C E ) v u l n e r a b i l i t...
Sean PeckJun 9, 20213 minThe Double-Extortion Paradigm: Ransomware 2.0The term ransomware has become nearly a household term. The primary concept of most attacks I’ve been involved in remediating is simple:...
Sean PeckMay 17, 20212 minWhy End-of-Life Products are Dangerous to your Bottom LineSoftware and hardware often have well-defined lifecycles that define how long the manufacturer has committed to providing support,...
LinkTechMar 1, 20212 minHelping Your Helpdesk Help You Try to think about the last time you had to submit a ticket to your IT Helpdesk. Was the service fast? Did the helpdesk technician...
LinkTechFeb 9, 20213 minCOVID-19 ScamsScammers are targeting recipients of Covid relief funds. They will target them by means of checking their postal mailbox and attempting...
LinkTechJan 4, 20212 minTips to Avoid Social Engineering Attacks During Video CallsMany organizations are still working remotely during this time, and the hackers are targeting people by spoofing popular video...
LinkTechDec 10, 20202 minWhat is a Cloud backup?What is the cloud? The cloud is a term used for any computing resources software or otherwise purchased and accessed through web access....
LinkTechDec 1, 20202 minWhat is a VPN? Does Your Company Need One?A Virtual Private Network (VPN) is used, to give users a more secure and private network to communicate with. VPNs can be used for...
Sean PeckNov 23, 20204 minDon't Build Your Business On a Shaky FoundationIt Pays to Start (and Stay) Structured In Your Organization’s Tech, From Startup to Enterprise Over the past couple of decades, I’ve...
LinkTechNov 9, 20201 minTis The Season for Cyber CriminalsUnfortunately the holiday shopping season is a prime target for those looking to gain wealth off of unsuspecting shoppers, and vulnerable...
LinkTechAug 24, 20201 minThe Importance of Blocking and Recognizing Phishing Attempts Every-day millions of Phishing emails are sent out across the internet containing malicious files, links, or instructions. Attackers use...