January 2022 Update: Vulnerability in Apache Log4j

RiskLarge and medium business entities  HighSmall business entities  HighHome users  HighIn review, a serious vulnerability in the Java logging package, Log4j (CVE-2021-44228) was disclosed, posing a severe risk to millions of consumer products to enterprise software and web applications. This vulnerability is being widely exploited by a growing set of attackers.When vulnerabilities are discovered and exploited, it risks a loss or breach of personal information, financial loss, and other irreversible harms. It is critical that companies and their vendors relying on Log4j act now, in order to reduce the likelihood of harm. To update your Log4j software package?to?the most current [...]

January 2022 Update: Vulnerability in Apache Log4j2022-01-24T03:25:22-07:00

Breaking down what 5G technology can bring you and your company

5G wireless technology is set to revolutionize the world’s telecommunications infrastructure, paving the way for even greater use of autonomous devices and expanding the number of interconnected devices in the Internet of Things (IoT).A historyThe first cellular telephones hit the market in the mid-1970s and offered wireless voice calling over an analog network. In the early 1990s, this first-generation cellular technology, using analog telecommunications standards, transitioned to a 2G digital network, allowing both voice and data to travel wirelessly between devices.3G and 4G gave us mobile internet and streaming video, respectively, leading to the rise of the smartphone and entirely [...]

Breaking down what 5G technology can bring you and your company2021-12-21T14:43:00-07:00

Vulnerability in Apache Log4j: Executive Briefing

RiskLarge and medium business entities  HighSmall business entities  HighHome users  HighA vulnerability has been discovered in Apache Log4j, a very ubiquitous logging package for Java. Successful exploitation of this vulnerability could allow for arbitrary code execution within the context of the systems and services that use the Java logging library, including many services and applications written in Java. Depending on the privileges associated with these systems and services, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If these systems and services have been configured to have fewer user rights, [...]

Vulnerability in Apache Log4j: Executive Briefing2021-12-11T17:45:33-07:00

Shedding Light on Artificial Intelligence in the Architectural, Engineering and Construction (AEC) Industries

The information contained within this article serves to raise the awareness of possible benefits, implications, and impacts of using artificial intelligence solutions across the AEC industry; many ideas presented, though, do apply to a broader range of organizations.AI and machine learning are elements of business intelligence (BI) strategies and technologies, which are used by enterprises for data analysis and information extraction. Traditional challenges, functions, or actions that AI techniques can address include reasoning, knowledge representation, planning, learning, natural language processing (and understanding), perception, and the ability to move and manipulate objects.In each challenge area, AI technologies are proving to have [...]

Shedding Light on Artificial Intelligence in the Architectural, Engineering and Construction (AEC) Industries2021-11-15T09:52:15-07:00

Secure Boot: Executive Briefing

Secure Boot is a boot integrity feature that is part of the Unified Extensible Firmware Interface (UEFI) industry standard; most modern computer systems are delivered with a standard Secure Boot policy installed.UEFI is a replacement for the legacy Basic Input Output System (BIOS) boot mechanism. UEFI provides an environment common to different computing architectures and platforms. UEFI also provides more configuration options, improved performance, enhanced interfaces, security measures to fight persistent firmware threats, and support for a wider variety of devices and form factors.Cybercriminals target firmware to persist on an endpoint. Firmware is stored and executes from memory that is [...]

Secure Boot: Executive Briefing2021-10-07T10:41:14-06:00

Can I shred paper originals after they are scanned?

In short, yes.Records management laws and rules do allow for records to be kept electronically in addition to, or instead of, physical copies. However, bear in mind that once a record is digitized, it must be accessible and maintained for the full life-cycle of the record and minimum retention period, which can be forever in the case of permanent records.As a general rule of thumb, you should store the documents at least six months prior to shredding the paper copies. Further, make certain to complete a visual quality control check on all scanned documents to make sure that they are [...]

Can I shred paper originals after they are scanned?2021-09-29T16:59:13-06:00

Understanding the Security Impact of Juice Jacking

Executive BriefJuice jacking is a common term that refers to compromising your mobile device through public charging stations, like those found in airports, hotels and coffee shops. Hackers can install special USB devices that contain malware in public charging stations.How does it work?When a phone is plugged in to charge, a piece of malware is automatically downloaded and installed onto the phone. The malware then provides hackers the ability to access your mobile device remotely and capture your activities, including email, online company files, banking credentials and much more.Guarding Against Juice JackingThe following are recommended safeguards to protect you from [...]

Understanding the Security Impact of Juice Jacking2021-08-18T10:54:38-06:00

July 2021 PrintNightmare Briefing

Executive BriefPrintNightmare is the name given to a critical remote code execution vulnerability in the Windows Print spooler service. Attackers can take advantage of this vulnerability to gain control of affected systems, causing widespread harm to internal and external parties.Technical DetailsThe RpcAddPrinterDriverEx() function is used to install a printer driver on a system. One of the parameters to this function is the DRIVER_CONTAINER object, which contains information about which driver is to be used by the added printer. The other argument, dwFileCopyFlags, specifies how replacement printer driver files are to be copied. An attacker can take advantage of the fact [...]

July 2021 PrintNightmare Briefing2021-07-08T15:01:28-06:00

Strong passwords: Essential for combating cyber risks

Creating a strong password is an essential step to protecting yourself and your company online. Using long and complex passwords is one of the easiest ways to defend yourself from cyber risks. Of course, nobody is immune to cyber threats, but when following these tips, you can minimize your chances of an incident. Use a long passphrase   You should consider using the longest password or passphrase permissible. For example, you can use a passphrase such as a news headline or even the title of the last book you read. Then add in some punctuation and capitalization.Don’t make passwords easy to guess  [...]

Strong passwords: Essential for combating cyber risks2021-05-06T10:08:51-06:00
Go to Top