Microsoft has released security updates that are impacting some security AV vendors, causing some of their customers using Windows 7, Windows 8.1, Windows 2008 R2, and Windows 2012 to occasionally experience system fails or hangs during boot up after application of the update. Many AV vendors are working very closely with Microsoft to resolve the issue. Microsoft has introduced a temporary block to stop computers not already affected from applying the latest Windows security update.
Additionally, we have a work around for those impacted customers. To be impacted, customers must meet all the criteria below. If they do not meet all the criteria, then they are not impacted.
1. Running Windows 7, Windows 8.1, Windows 2008 R2, or Windows 2012
2. Have applied the latest Windows security update and have rebooted after the update is complete Important note: If customers have not yet rebooted, they should uninstall the latest Microsoft security update before rebooting
KBA 133945 will continue to be updated with the latest information. The latest information about this issue and remediation steps are documented in KBA 133945.
Database technologies are often overlooked forgotten about because they typically do not take that much manipulation at an administrative layer…legacy systems are just expected to work and IT personnel are expected to keep them working. With data changing so rapidly and databases being so heavily relied upon, it would make more sense to spend more time and effort to ensure the health and version is up to date.
There are plenty of reasons to upgrade your database:
- A platform for rapid reporting and analytics
- Increased scalability and availability
- Support for new data sources and types
- Robust security
- Lower cost of ownership
- More stability
- Better reporting results
Last month HP has announced a recall of over 75k laptop models the bad batteries that have the potential of causing fires. The batteries were shipped between December, 2015 and April, 2018. This issue deals with over 50,000 batteries and affects the following models:
- HP ProBooks (64x G2 and G3 series, 65x G2 and G3 series, 4xx G4 series)
- HPx360 (310 G2), HP Pavilion x360 11-inch Notebook PC
- HP 11 Notebook PC, HP ZBook (17 G3, and Studio G3) mobile workstations.
- The batteries were also sold as accessories or replacement batteries for the HP ZBook Studio G4 mobile workstation
- HP ProBook 4xx G5 series, HP ENVY 15
- HP Mobile Thin Clients (mt21, mt22, and mt31)
Cisco has made the determination with new leadership to move their business model to more Software-based as opposed to pushing so much hardware. This is far away from their normal form of business practice. The new CEO is shifting the company’s offerings toward software-based networking, security and management products, which customers increasingly prefer because they’re less expensive and more adaptable. Recent acquisitions such as Jasper Technologies, whose software allows companies to connect all sorts of electronic devices, and a new emphasis on security are helping make Cisco less dependent on its expensive, purpose-built hardware, especially as lackluster economic growth means corporate customers are reluctant to spend.
Google has uncovered a rare security flaw for Apple’s computer operating system MacOS…it was a bug that was known by Apple…they are aware and have been notified that it has to be fixed in the next 90 days. The Google folks are calling the bug, “BuggyCow.”
The bug allows malware already running on a Mac, or a rogue logged-in user, to gain access to the more protected bits of their computer. The Mac would already need to be compromised in some way to actually exploited the bug. Security is build in layers and in this case at an OS layer that is not the case with the current OS in production.
Finally USB 4 is out and should be something to consider when purchasing your next computer. The new standard is based on Intel’s Thunderbolt protocol and supports a range of features, including data transfer rates of up to 40 Gbps, display interfaces, and power delivery. Its support to be released around May 2019. The new interface will use USB Type-C connectors and will maintain backwards compatibility with USB 2.0, USB 3.2, and Thunderbolt 3 interfaces.
It is a great misunderstanding that your email is backed up in the cloud with Microsoft when you leverage their service for email. This is not the case and something that organizations should be mindful of depending on compliance or overall legal requirements via liability. In many cases if there is a legal situation with an employee or client, the judge in the discovery process will request an organization to reproduce emails for the time period in question and many organizations are not set up for this. There are several solution out there that bva uses that will capture all inbound and outbound message correspondence. Typically a service of this nature is an additional cost of about $2 to $4 per user/per month but having an online backup of your data in a secure location is a must. If you would like to know more about solutions that could work for your business, please contact bva.
So basically hackers are getting a lot smarter, they have finally developed a new Malware that stays around after you rebuild a PC in the event that is it compromised. This created quite a difficult situation when trying to isolate and deal with. The name os the malware is called Lojax and developed by Russian hackers…pretty eloquent and precise. The malware hides out in the flash memory by re-writting the computers UEFI which allows for it to remain after rebuilding a PC via wipe and build or replacing its hard drive with another.
Network and Computer Security is build in different layers of solutions to ensure you are truly protected. Too often I walk into meetings with CEO/CFO’s that claim they are secure due to being on a single security platform of products. Of course all of this is in a single interface and connection point. Layers…layers…
Some hackers are getting creative in getting into people’s system by leveraging USB cables that have a Wifi Card in them which hallway the hacker the ability to access remotely and be in your local system. Once in the hacker can browse the network and servers at their leisure to capture any intellectual property without anyone knowing. The only left over signature would be the local device the USB cable is plugged into. It’s important to be mindful of the USB devices your are leveraging in your business community to ensure a better degree of security. There are also system tools that can be installed on all systems to notify your local admin when a device of this nature is within the network.