2023 will become a record-breaking year in the volume of cybercrime. So, here are the top cybersecurity trends we recommend looking out for in 2023.
Jan 13, 2023 | Blog
Many apps default to per-user installs. Here is why you should transition them all to machine-wide installs. Spoiler: patching, patching, patching!
Jan 13, 2023 | Blog
According to Air France-KLM, details including customers’ names, email addresses, phone numbers, account numbers, and mileage balances might have been exposed.
In this issue: January 2023 Patch Tuesday updates and vulnerabilities patched by other vendors, including Google Chrome, Mozilla Firefox, Citrix, Linux, WordPress, Foxit Reader, and VMware.
Dec 23, 2022 | Blog
To help you navigate through over 400 new features and improvements, we’ve compiled the top seven most-awaited and now available Action1 features.
This is a review of the most serious patched Patch Tuesday vulnerabilities and those of other Windows software.
Nov 29, 2022 | Blog
Get a comprehensive guide on how to choose an effective and reliable patch management software solution.
This digest explains the most serious vulnerabilities in popular Windows software that have been patched in October.
Nov 2, 2022 | Blog
The first step in ensuring effective and reliable application of updates is to develop a solid patch management policy that spells out all the processes involved, along with all the participants and their responsibilities.
This article lays out the essential components for an effective policy and provides examples of how they should be written.
As usual, we review the most serious vulnerabilities in popular Windows software for which patches were released in September, including those from Patch Tuesday.
Sep 28, 2022 | Blog
If your company’s patch management process has been halted, where do you start to resolve the problem? How do you get the software upgrade process back to an optimal level after years of issues? Here is a detailed plan.
As usual, we review the most serious vulnerabilities in popular Windows software for which patches were released during the past month, including those from Patch Tuesday.
Aug 23, 2022 | Blog
Patch management is often a complicated process because many organizations use proprietary software. The lack of enough staff members and strict legal requirements also negatively impact patch management. As a result, organizations need a multi-staged approach to streamline their server patch management process. Here is a six-step patching policy template that you should know.
Each month, we review the most serious vulnerabilities in popular Windows software for which patches were released during the past month, including those from Patch Tuesday.
In this issue, you will learn about patches for vulnerabilities from Microsoft, Microsoft Edge, Google Chrome, Mozilla Firefox, Foxit PDF Reader, Java, Adobe, VMware.
This digest explores the most serious vulnerabilities in popular Windows software for which patches have been provided in July’s Patch Tuesday.
On the 1st of July 1 CISA has added...
Jun 22, 2022 | Blog
As the business world grows ever more reliant on data and technology, the risk profile for many organizations continues to expand. Cybersecurity is by far the most disconcerting and widespread concern of the many different types of security risks to organizations. The Allianz Risk Barometer ranks cyber incidents (cyberattacks, IT outages, data breaches, etc.) as the number one business risk in 2022. For perspective, cyber threats are up there with business interruptions, natural catastrophes, pandemic outbreaks, and climate change.
A new and very dangerous Microsoft Windows zero-day vulnerability was recently discovered. Tracked as CVE-2022–30190, it is nicknamed “Follina”. Action1 arms internal IT departments and MSPs with advanced scripting capabilities to mitigate Follina vulnerabillity.
May 17, 2022 | Blog
Malware infections are a dangerous form of cyberattack. The problem is that malware comes in different shapes and sizes, making it hard to pin them down, learn their malice, and prevent infections. This article looks and the different types of malware—what they are and how they work. We’ll also cover tips for protecting digital assets from malicious software.
Apr 19, 2022 | Blog
RMM vs. PSA, which is better? Well, this is a bit more complicated than a “versus” situation. RMM and PSA software applications are not technically interchangeable—each serves a different purpose from the other. Choosing between the two comes down to what your business needs. Many MSPs actually deploy and run both RMM and PSA tools simultaneously.