2023 will become a record-breaking year in the volume of cybercrime. So, here are the top cybersecurity trends we recommend looking out for in 2023.
Sophos Endpoint Agent Silent Installation Challenges
A real-life example of how one Action1 customer dealt with Sophos Agent deployment using Action1
Security Implications of Per-user Application Installs
Many apps default to per-user installs. Here is why you should transition them all to machine-wide installs. Spoiler: patching, patching, patching!
The Air France-KLM data breach
According to Air France-KLM, details including customers’ names, email addresses, phone numbers, account numbers, and mileage balances might have been exposed.
Patch Tuesday January 2023
January 2023 Patch Tuesday updates and vulnerabilities patched by third-party vendors.
Finding LastPass Instances Installed as Chrome Extensions
Discover how to find all installed Google Chrome extections including LastPass with our step-by-step guide.
Enabling Microsoft Update via PowerShell or Command Line?
Discover how to enable Microsoft product updates via script with our easy-to-follow guide.
PowerShell One-liner to Check for Missing Windows Updates
Easily check for missing Windows updates using our simple one-liner script.
Top 7 NEW Action1 Features You Can’t Miss!
To help you navigate through over 400 new features and improvements, we’ve compiled the top seven most-awaited and now available Action1 features.
Patch Tuesday December 2022
This is a review of the most serious patched Patch Tuesday vulnerabilities and those of other Windows software.
November 2022 Vulnerability Digest from Action1
This digest explains the most serious vulnerabilities in popular Windows software that have been patched in October.
October 2022 Vulnerability Digest from Action1
As usual, we review the most serious vulnerabilities in popular Windows software for which patches were released in September, including those from Patch Tuesday.
Patch Management Crisis? How to Get Over It.
If your company’s patch management process has been halted, where do you start to resolve the problem? How do you get the software upgrade process back to an optimal level after years of issues? Here is a detailed plan.
September 2022 Vulnerability Digest from Action1
As usual, we review the most serious vulnerabilities in popular Windows software for which patches were released during the past month, including those from Patch Tuesday.
August 2022 Vulnerability Digest from Action1
Each month, we review the most serious vulnerabilities in popular Windows software for which patches were released during the past month, including those from Patch Tuesday.
In this issue, you will learn about patches for vulnerabilities from Microsoft, Microsoft Edge, Google Chrome, Mozilla Firefox, Foxit PDF Reader, Java, Adobe, VMware.
July 2022 Vulnerability Digest from Action1
This digest explores the most serious vulnerabilities in popular Windows software for which patches have been provided in July’s Patch Tuesday.
How to Fix Windows LSA Spoofing Vulnerability, Still Actively Exploited in the Wild
On the 1st of July 1 CISA has added...
What Is The Most Common Threat To Information Security In an Organization?
As the business world grows ever more reliant on data and technology, the risk profile for many organizations continues to expand. Cybersecurity is by far the most disconcerting and widespread concern of the many different types of security risks to organizations. The Allianz Risk Barometer ranks cyber incidents (cyberattacks, IT outages, data breaches, etc.) as the number one business risk in 2022. For perspective, cyber threats are up there with business interruptions, natural catastrophes, pandemic outbreaks, and climate change.
Action1 Provides Free Automated Scripting to Mitigate Follina (CVE 2022-30190)
Action1 arms internal IT departments and MSPs with advanced scripting capabilities to mitigate Follina vulnerability, a newly discovered Windows zero-day.
The 10 Most Common Types of Malware
Malware infections are a dangerous form of cyberattack. The problem is that malware comes in different shapes and sizes, making it hard to pin them down, learn their malice, and prevent infections. This article looks and the different types of malware—what they are and how they work. We’ll also cover tips for protecting digital assets from malicious software.