A security alert has been released for DRUPAL web sites. Drupal is one of the top 3 CMS (content management systems) for websites. These vulnerabilities have not been found in Joomla and WordPress (the other top 2 CMS’s). One of the issue vulnerabilities are found in the update process and allow hackers to upload “poisoned” content to the server or even take over the server.
As an IT service provider, we have watched our core services become commoditized as technology evolves and becomes more entrenched. My good friend and bestselling author Ian Altman (www.growmyrevenue.com) told me, “The best way to not sell in a commodity business is to not sell in a commodity business.
Do you use Internet Explorer as your browser? We’ve been warned about this day since 2014. At that time Microsoft announced that only the newest version of IE will be supported on its supported operating systems. "After Jan. 12, 2016, only the most recent version of Internet Explorer available for a supported operating system will receive technical support and security updates," said Roger Capriotti, Director of Internet Explorer, back in 2014. You can check out his full post: Stay up-to-date with Internet Explorer.
Tax related identity theft is a growing problem, as we saw with the Intuit Turbo Tax incidents earlier this year. Tax return identity theft is when someone uses another taxpayer’s name and social security number to file a fraudulent tax return for a refund.
This week, I read one of the most “on point” articles I have seen in quite some time. Joe Peppard wrote for the Harvard Business Review, “Executives Get the IT They Deserve”. He pointedly addresses issues that we come across way too often – starting with the reality of consumer vs business IT. The fact is, often consumer IT typically just works, whether it’s your iphone or a printer or your home wifi – it’s simple and provides simple service.
With the recent release of Microsoft Office 2016, it may have you wondering "how is this version different from the previous?" What makes the 2016 version so special? Well, a lot! There’s MANY new features that have been added to programs such as PowerPoint, Excel and Word.
We have addressed previously the fact is that the human is the weakest link in any security chain. There are unfortunately many ways that the human link can be disrupted. In this article we will address one of those, one that may in fact be the weakest link in the weakest link – Passwords.
For the last 4 years, Shred It, the document destruction company has been sponsoring an international survey to gauge business executives’ attitudes towards security. The latest one, from 2014, shows that in America executives are actually de-prioritizing security within their organizations.
You and probably everyone in your business has been the subject of a phishing attack at some point. If you receive email, you have received a phishing email. What exactly is a phishing attack? Broadly defined, Phishing means an exploratory attack on a broad audience.
Original Article: http://thevarguy.com/business-technology-solution-sales/061015/top-security-areas-sps-need-focus
As a professional in the IT field for 20 years, I believe this is a great article because it demonstrates in a few paragraphs all the things we are constantly reminding our clients.