Last spring, many of us went through the unprecedented process of moving to remote work. The migration was largely a lift and shift exercise of office gear and technology. For many, this meant tweaking underlying security and connectivity technologies to enable seamless remote work. As an IT managed service provider, we observed first-hand
Business has changed for many in the wake of the ongoing COVID-19 pandemic. Last year many organizations pivoted to a remote work strategy, and now the focus is shifting to office re-entry considerations. However, for each of these transitions, one aspect that remains critical is the need to secure your workforce and data, no matter where business is happening. So how can you be sure that your IT systems are thoughtfully aligned to support your next strategic phase of business operations securely?
In a recent presentation to business leaders, Kent Goodrow, a Systems Engineering client Account Manager, spoke about the evolution of identity and access management (IAM). He noted the increasing business exposure to modern threats due to work-from-anywhere, cloud-first environments. Kent detailed how IAM has evolved over the last few years and how it now works to protect access to corporate resources. Below is an outline of his presentation on implementing IAM as your organization's first line of defense.
On April 13, Microsoft released its monthly patches for vulnerabilities found within their products. In their release announcement, Microsoft strongly recommends prioritizing the CVE 2021 28481 security update which affects Exchange servers 2013, 2016, and 2019. This vulnerability allows hackers access to mailboxes to read or even exfiltrate sensitive information.
Systems Engineering is aware of the FBI and CISA joint security advisory indicating threat actors are potentially using multiple Common Vulnerabilities and Exposures (CVE) to exploit Fortinet operating systems, known as FortiOS. The advisory calls out three vulnerabilities that may be used to gain access to business networks to begin data exfiltration or data encryption attacks. Vulnerabilities include;
Systems Engineering is aware of multiple vulnerabilities within Cisco Jabber Client software. These vulnerabilities affect Cisco Jabber for Windows, Cisco Jabber for MacOS, and Cisco Jabber for Mobile platforms. Vulnerabilities include:
In 1970, around the same time David Bowie was writing “Changes”, Alvin and Heidi Toffler wrote a book entitled “Future Shock,” arguing that the ever-accelerating rate of technological and social change would create fear, confusion, and tension across the globe. In the last 50 years, their predictions have been largely prescient. While cloud technologies keep getting better and have improved our lives in a myriad of ways, there is no doubt that it leaves some people’s heads spinning. So how do you keep up with the cloud?