Microsoft recently announced a pair of Windows 10 Remote Code Execution vulnerabilities, CVE-2019-1181 and CVE-2019-1182. These vulnerabilities allow cybercriminals to obtain remote control of a computer over a network connection. Microsoft discovered the vulnerabilities during routine testing of Windows 10, which allowed them to publish the required security updates and notify the public at the same time.
Trends in Information Technology are continuously changing and, as a result, organizations are having to adapt to those changes. Let's look at the most prominent IT trends that are showing up today.
UPDATED JULY 2020
Have you wanted to move your organization's infrastructure to the cloud, but have reservations? Security, compliance, cost... These are all areas you wouldn’t want to have surprises. To help you navigate this process, we put together some key points to consider before making the move to the cloud.
At Systems Engineering, employees are our number one resource. Our success depends on our dedicated and skilled staff who share our values and contribute to our vision. The Systems Engineering Spotlight gives a brief but revealing look at one of our valuable members.
In the coming year, how will your organization be less vulnerable to security threats, remain in compliance, and continue to receive the latest product support?
Quick answer: Upgrade.
Review the chart below and ensure that your Microsoft products are not about to expire. The chart quickly points out some significant end-of-life/support dates that are on the horizon for some of the more popular Microsoft products, including Windows 7, Exchange 2010, and Office 2010.
It seems these dates are far out, but in reality, upgrade discussions should begin now in order to prepare appropriately. By applying upgrades before products fall out of support, your business will be less vulnerable to security threats, remain in compliance, and continue to receive the latest product support.
If you’ve been in or around information technology (IT), you are most likely familiar with Unified Communications and Collaboration (UCC). If not, maybe you've heard of its subscription-based cloud-delivered model, unified communications-as-a-service (UCaaS). Gartner breaks UCC into six broad communication functions:
Assuming you have your network security basics in place, there are a few cybersecurity solutions that are relatively inexpensive that many businesses have yet to include in their cybersecurity war chest. These tools help you stay ahead of the cyber criminals and provide additional protection to reduce your business' chance of a breach. If you do nothing else with your cybersecurity strategy in 2019, be sure to put these security safeguards in your budgets this fall as they will provide tremendous value for the investment:
Preparing budgets for the upcoming year includes planning for any products that will be reaching end-of-life/support. According to Spiceworks, the need to upgrade outdated IT products will be a big focus for many businesses in 2019. For businesses up to 500 seats, replacing end-of-life products is the top driver of new hardware, software, services purchases, and cloud solutions.
At Systems Engineering, employees are our number one resource. Our success depends on our dedicated and skilled staff who share our values and contribute to our vision. Our Employee Spotlight gives a brief but revealing look at one of our valuable members.
Your organization’s data is in the cloud, so now what? Is it secure? Where is it? Is it readily available? Who is accessing it?