2023 will become a record-breaking year in the volume of cybercrime. So, here are the top cybersecurity trends we recommend looking out for in 2023.
Blog
Security Implications of Per-user Application Installs
Jan 13, 2023 | Blog
Many apps default to per-user installs. Here is why you should transition them all to machine-wide installs. Spoiler: patching, patching, patching!
The Air France-KLM data breach
Jan 13, 2023 | Blog
According to Air France-KLM, details including customers’ names, email addresses, phone numbers, account numbers, and mileage balances might have been exposed.
Patch Tuesday January 2023
Jan 11, 2023 | Blog, Patch Tuesday
In this issue: January 2023 Patch Tuesday updates and vulnerabilities patched by other vendors, including Google Chrome, Mozilla Firefox, Citrix, Linux, WordPress, Foxit Reader, and VMware.
Top 7 NEW Action1 Features You Can’t Miss!
Dec 23, 2022 | Blog
To help you navigate through over 400 new features and improvements, we’ve compiled the top seven most-awaited and now available Action1 features.
Patch Tuesday December 2022
Dec 13, 2022 | Blog, Patch Tuesday
This is a review of the most serious patched Patch Tuesday vulnerabilities and those of other Windows software.
How to Choose a Patch Management Software Solution
Nov 29, 2022 | Blog
Get a comprehensive guide on how to choose an effective and reliable patch management software solution.
November 2022 Vulnerability Digest from Action1
Nov 9, 2022 | Blog, Patch Tuesday
This digest explains the most serious vulnerabilities in popular Windows software that have been patched in October.
How to Create a Patch Management Policy
Nov 2, 2022 | Blog
The first step in ensuring effective and reliable application of updates is to develop a solid patch management policy that spells out all the processes involved, along with all the participants and their responsibilities.
This article lays out the essential components for an effective policy and provides examples of how they should be written.
October 2022 Vulnerability Digest from Action1
Oct 12, 2022 | Blog, Patch Tuesday
As usual, we review the most serious vulnerabilities in popular Windows software for which patches were released in September, including those from Patch Tuesday.
Patch Management Crisis? How to Get Over It.
Sep 28, 2022 | Blog
If your company’s patch management process has been halted, where do you start to resolve the problem? How do you get the software upgrade process back to an optimal level after years of issues? Here is a detailed plan.
September 2022 Vulnerability Digest from Action1
Sep 15, 2022 | Blog, Patch Tuesday
As usual, we review the most serious vulnerabilities in popular Windows software for which patches were released during the past month, including those from Patch Tuesday.
6-Step Patch Management Process
Aug 23, 2022 | Blog
Patch management is often a complicated process because many organizations use proprietary software. The lack of enough staff members and strict legal requirements also negatively impact patch management. As a result, organizations need a multi-staged approach to streamline their server patch management process. Here is a six-step patching policy template that you should know.
August 2022 Vulnerability Digest from Action1
Aug 17, 2022 | Blog, Patch Tuesday
Each month, we review the most serious vulnerabilities in popular Windows software for which patches were released during the past month, including those from Patch Tuesday.
In this issue, you will learn about patches for vulnerabilities from Microsoft, Microsoft Edge, Google Chrome, Mozilla Firefox, Foxit PDF Reader, Java, Adobe, VMware.
July 2022 Vulnerability Digest from Action1
Jul 14, 2022 | Blog, Patch Tuesday
This digest explores the most serious vulnerabilities in popular Windows software for which patches have been provided in July’s Patch Tuesday.
How to Fix Windows LSA Spoofing Vulnerability, Still Actively Exploited in the Wild
Jul 8, 2022 | Blog, Patch Tuesday
On the 1st of July 1 CISA has added...
What Is The Most Common Threat To Information Security In an Organization?
Jun 22, 2022 | Blog
As the business world grows ever more reliant on data and technology, the risk profile for many organizations continues to expand. Cybersecurity is by far the most disconcerting and widespread concern of the many different types of security risks to organizations. The Allianz Risk Barometer ranks cyber incidents (cyberattacks, IT outages, data breaches, etc.) as the number one business risk in 2022. For perspective, cyber threats are up there with business interruptions, natural catastrophes, pandemic outbreaks, and climate change.
Action1 Provides Free Automated Scripting to Mitigate Follina (CVE 2022-30190)
Jun 8, 2022 | Blog, How-to Articles, Patch Tuesday
A new and very dangerous Microsoft Windows zero-day vulnerability was recently discovered. Tracked as CVE-2022–30190, it is nicknamed “Follina”. Action1 arms internal IT departments and MSPs with advanced scripting capabilities to mitigate Follina vulnerabillity.
The 10 Most Common Types of Malware
May 17, 2022 | Blog
Malware infections are a dangerous form of cyberattack. The problem is that malware comes in different shapes and sizes, making it hard to pin them down, learn their malice, and prevent infections. This article looks and the different types of malware—what they are and how they work. We’ll also cover tips for protecting digital assets from malicious software.
Overview of RMM and PSA Tools for Managed Services Providers
Apr 19, 2022 | Blog
RMM vs. PSA, which is better? Well, this is a bit more complicated than a “versus” situation. RMM and PSA software applications are not technically interchangeable—each serves a different purpose from the other. Choosing between the two comes down to what your business needs. Many MSPs actually deploy and run both RMM and PSA tools simultaneously.