Last October, Cisco announced a security vulnerability in their Duo Authentication for Windows Logon and RDP that impacted releases 4.0 through 4.2. In April, Cisco delivered a new release and a fix for CVE-2024-20292.
SECURITY BULLETIN: Cisco Duo Authentication for Windows Logon and RDP Information Vulnerability (CVE-2024-20292)
Systems Engineering is aware of three Vulnerabilities affecting the Cisco ASA; Cisco Adaptive Security Appliance Web Service Denial of Service Vulnerability - CVE-2024-20353, Cisco Adaptive Security Appliance Command Injection Vulnerability - CVE-2024-20358, and Cisco Adaptive Security Appliance Persistent Local Code Execution Vulnerability - CVE-2024-20359.
Imagine the impact on your organization in the event of an IT disaster like an office fire, systems failure, or ransomware attack. If all your data vanished, how quickly could your organization bounce back? Would it be a matter of minutes, hours, days, or even weeks? Consider the repercussions on your customers and employees. These are the critical data resiliency queries that business leaders must address when evaluating their data backup solutions and recovery strategies.
The newly updated NIST Cybersecurity Framework (CSF) 2.0 is here, and it’s packed with important updates that business leaders need to know to keep their companies safe. Let’s dive into what NIST CSF 2.0 means for you and why it’s more important than ever.
Today, most organizations agree that cybersecurity risk is also a primary business risk. As organizations look for ways to reduce their cybersecurity risks while being mindful of their budgets, many are turning to multi-year plans to gradually increase the strength of their cybersecurity program. One of the best ways to organize and prioritize your cybersecurity planning is by
Systems Engineering is aware of two vulnerabilities, the Fortinet FortiClient EMS Pervasive SQL injection in DAS component (CVE-2023-48788) and FortiClient EMS - CSV injection in the log download feature (CVE-2023-47534).
In today's digital landscape, the prevalence of remote work has led to an increasing reliance on employees' personal devices for various tasks. From sending emails to accessing applications and reviewing documents, the convenience of utilizing personal devices for business productivity actions has become commonplace. While this trend offers undeniable benefits in terms of flexibility and efficiency, it also introduces new risks to sensitive company data.