For SMBs, Microsoft offers a new layer of server protection

Credit to Author: Susan Bradley| Date: Mon, 25 Jul 2022 09:00:00 -0700

Do you run a small business with on-premises servers?

Chances are, you rely on technology that includes servers, whether they’re Windows- or Linux-based. With that in mind, Microsoft recently announced it’s previewing “server protection for small business” — bundling the offering with Microsoft Defender for Business.

This is noteworthy because until now, most Endpoint Detection and Response (EDR) solutions have been expensive and typically only deployed by larger enterprises. (EDR is an integrated, layered approach to endpoint protection that combines real-time continuous monitoring and endpoint data analytics with rule-based automated response.)

To read this article in full, please click here

Read more

With a light July Patch Tuesday, it's time to invest in your IT processes

Credit to Author: Greg Lambert| Date: Fri, 15 Jul 2022 12:04:00 -0700

Though we get a reprieve from Exchange updates in this month’s Patch Tuesday update, more printer updates are on the way. Even with no updates for Microsoft Exchange or Visual Studio, Adobe is back with 15 critical updates for Adobe Reader. And Microsoft’s new patch deployment tool Auto-Patch is now live. (I always thought application testing was the main problem here, but actually getting patches deployed is still tough.)

Though the numbers are still quite high (with 86+ reported vulnerabilities), the testing and deployment profile for July should be fairly moderate. We suggest taking the time to harden your Exchange Server defenses and mitigation processes, and invest in your testing processes.

To read this article in full, please click here

Read more

Now’s the time to prep for Microsoft’s Excel macro crackdown

Credit to Author: Susan Bradley| Date: Mon, 11 Jul 2022 08:56:00 -0700

On July 8, Microsoft pulled back from its decision in February to block macros in Excel documents by default. Microsoft had said it would block Excel files that contained macros if they were downloaded from the internet. (Malicious actors use these lures as a way to launch attacks on networks; specifically, ransomware and other types of malicious activity can launched from a plain, old malicious spreadsheet.)

Microsoft still plans to put this blocking in place, but only after “a better experience.” In the meantime, there are actions you can take now so you won’t need to worry about the change in the future.

If you work for a firm that’s developed spreadsheets for your own internal office use, chances are the spreadsheet does not have a digital signature. Signing machos is similar to how websites use SSL certificates to validate the site is legit. The hardest part of the self-signing process is deciding whether you want to purchase a code-signing certificate or use the self-signed certificate process. (I can tell you from personal experience that trying to purchase a code-signing certificate is an expensive and cumbersome process. I don’t recommend that option, except for large enterprises where the code-signing process is routine.)

To read this article in full, please click here

Read more

Apple slaps hard against ‘mercenary’ surveillance-as-a-service industry

Credit to Author: Jonny Evans| Date: Thu, 07 Jul 2022 06:17:00 -0700

Apple has struck a big blow against the mercenary “surveillance-as-a-service” industry, introducing a new, highly secure Lockdown Mode to protect individuals at the greatest risk of targeted attacks. The company is also offering millions of dollars to support research to expose such threats.

Starting in iOS 16, iPadOS 16 and macOS Ventura, and available now in the latest developer-only betas, Lockdown Mode hardens security defenses and limits the functionalities sometimes abused by state-sponsored surveillance hackers. Apple describes this protection as “sharply reducing the attack surface that potentially could be exploited by highly targeted mercenary spyware.”

To read this article in full, please click here

Read more

Think twice before deploying Windows’ Controlled Folder Access

Credit to Author: Susan Bradley| Date: Tue, 05 Jul 2022 07:29:00 -0700

As ransomware attacks gained steam in the mid-2010s, Microsoft sought to give Windows users and admins tools to protect their PCs from such attacks. With its October 2017 feature update, the company added a feature called Controlled Folder Access to Windows 10.

On paper, Controlled Folder Access sounds like a great protection for consumers, home users, and small businesses with limited resources. As defined by Microsoft, “Controlled folder access helps protect your valuable data from malicious apps and threats, such as ransomware. Controlled folder access protects your data by checking apps against a list of known, trusted apps. Supported on Windows Server 2019, Windows Server 2022, Windows 10, and Windows 11 clients, controlled folder access can be turned on using the Windows Security App, Microsoft Endpoint Configuration Manager, or Intune (for managed devices).”

To read this article in full, please click here

Read more

FCC commissioner wants Apple, Google to remove TikTok from App Stores

Credit to Author: Jonny Evans| Date: Wed, 29 Jun 2022 05:34:00 -0700

FCC Commissioner Brendan Carr has written to Apple and Google to request that both companies remove the incredibly popular TikTok app from their stores, citing a threat to national security.

Is your data going TikTok?

Carr warns the app collects huge quantities of data and cited a recent report that claimed the company has accessed sensitive data collected from Americans. He argues that TikTok’s, “pattern of conduct and misrepresentations regarding the unfettered access that persons in Beijing have to sensitive U.S. data…puts it out of compliance,” with App Store security and privacy policies.

To read this article in full, please click here

Read more

The surveillance-as-a-service industry needs to be brought to heel

Credit to Author: Jonny Evans| Date: Fri, 24 Jun 2022 09:40:00 -0700

Here we go again: another example of government surveillance involving smartphones from Apple and Google has emerged, and it shows how sophisticated government-backed attacks can become and why there’s justification for keeping mobile platforms utterly locked down.

What has happened?

I don’t intend to focus too much on the news, but in brief it is as follows:

  • Google’s Threat Analysis Group has published information revealing the hack.
  • Italian surveillance firm RCS Labs created the attack.
  • The attack has been used in Italy and Kazakhstan, and possibly elsewhere.
  • Some generations of the attack are wielded with help from ISPs.
  • On iOS, attackers abused Apple’s enterprise certification tools that enable in-house app deployment.
  • Around nine different attacks were used.

The attack works like this: The target is sent a unique link that aims to trick them into downloading and installing a malicious app. In some cases, the spooks worked with an ISP to disable data connectivity to trick targets into downloading the app to recover that connection.

To read this article in full, please click here

Read more

Trouble with Windows? You have support options

Credit to Author: Susan Bradley| Date: Tue, 21 Jun 2022 05:15:00 -0700

So, you finally got around to installing a Windows update from Microsoft, and there’s a problem. Where do you go for support and assistance?

Short answer: it depends.

If you are an Enterprise customer and have an issue with your work computer — whether in the office or remote — there should be a designated IT administrator or help desk for you. You either call the help desk or open a trouble ticket and someone gets back to you. Often, they have tools to remotely connect to your computer and see what’s going on.  If the issue is so serious your machine can’t be fixed, they’ll deploy a new computer or reimage your PC using tools such as Autopilot to deploy a fresh copy of Windows for you.

To read this article in full, please click here

Read more

Microsoft delivers solid Windows-focused updates for June's Patch Tuesday

Credit to Author: Greg Lambert| Date: Fri, 17 Jun 2022 12:09:00 -0700

June’s Patch Tuesday updates, released on June 14, address 55 vulnerabilities in Windows, SQL Server, Microsoft Office, and Visual Studio (though there are oo Microsoft Exchange Server or Adobe updates this month). And a zero-day vulnerability in a key Windows component, CVE-2022-30190, led to a “Patch Now” recommendation for Windows, while the .NET, Office and SQL Server updates can be included in a standard release schedule.

To read this article in full, please click here

Read more

Will COVID's legacy be a healthier workplace?

Credit to Author: Paul Gillin| Date: Fri, 17 Jun 2022 04:30:00 -0700

Read more