Action1 5 Category: Blog

Blog

Microsoft Patch Tuesday, May 2021 Review

Microsoft Patch Tuesday, May 2021 Review

Today, the second Tuesday of May, is Microsoft’s Patch Tuesday. This month’s patch release includes fixes for 55 CVEs – 50 classified as Important, one moderate, and four marked as critical. Microsoft also patched three zero-day vulnerabilities that were publicly disclosed but not yet exploited at the time of this release. The 55 fixes touch on various Microsoft products and services, including Exchange Server, Skype for Business, Visual Studio, MS Office, .NET Core, SharePoint Server, and Hyper-V. Along with May’s patch cycle, Microsoft also rolled out cumulative updates for all supported versions of Windows. The freshly updated Windows 10 OS builds 19041.895 and 19042.895 mostly feature enhanced security for Windows System Core Components, browsers, and other basic functions, plus a couple of new peripheral drivers and UI elements. Let’s get back to the security flaws addressed in this month’s patch dump.

read more
The Admin’s IT Guide to Remote Endpoint Management

The Admin’s IT Guide to Remote Endpoint Management

More people than ever are working from home, and IT teams are being pushed to the limit trying to maintain both user productivity and corporate security. They need to be able to keep endpoints properly maintained, monitor network activity, troubleshoot issues promptly, and more — all while remote.
The job can feel overwhelming. But it doesn’t have to be. To help, we’ve drawn up a list of the essential best practices managing a remote workforce, along with tips for implementing them effectively.

read more
Microsoft Patch Tuesday, March 2021  Review

Microsoft Patch Tuesday, March 2021 Review

Microsoft Patch Tuesday started early this month with an out-of-band patch release on March 2. This week’s batch fixes a total of 89 CVEs; among these are the seven out-of-band fixes from last week, ten ‘critical’ fixes, and 72 marked as ‘important.’ Two of the patches address separate zero-day vulnerabilities, one of which had already been exploited in the wild. This month’s patches cover a wide range of Microsoft products and services, including Azure, Office products, and Windows internet browsers.

read more
WSUS Patch Management Alternatives

WSUS Patch Management Alternatives

The corporate world has been through big changes over recent years, with cloud deployments and remote working emerging as the new normal in many industry sectors. How people communicate, collaborate, and create value is changing before our eyes, with existing technology solutions not always relevant to business interests. Windows Server Update Services (WSUS Patch Management) is an example of a legacy solution that continues to be eclipsed by more advanced and efficient services. There are more automated patch management tools alternative to WSUS, some of which are much better placed to meet the new agile and flexible workforce’s demands.

read more
Tackling Microsoft Defender Remote Code Execution Vulnerability

Tackling Microsoft Defender Remote Code Execution Vulnerability

Microsoft rolled out its monthly set of security updates. The security patches bundle included fixes for 83 vulnerabilities on Windows operating system, enterprise servers, development tools, and various cloud products and services. Among these patches, ten were described as critical, and one of the most important patches was the fix for Microsoft Defender Remote Code Execution Vulnerability – a zero-day vulnerability that Microsoft said was exploited in the wild before the patch was released.

read more
Choosing Remote Desktop Access Tools for IT Management and MSP Business

Choosing Remote Desktop Access Tools for IT Management and MSP Business

IT professionals can no longer swing by someone’s desk and grab their desktop or pick up a laptop to work on an issue. Due to public health concerns and social distancing, remotely triaging and resolving issues is the new normal, and IT workers have to consider how to install monitoring software remotely. The shift towards working-from-home has spiked the demand for endpoint remote management tools among organizations. Most businesses simply have not been prepared to face a sudden mass transition to remote operations and social distancing. However, the benefits of utilizing cloud-based remote monitoring and management tools have been known for as long as remote work has been practiced.

read more
What is an Endpoint Protection Platform (EPP)

What is an Endpoint Protection Platform (EPP)

With businesses making use of the cloud technologies, and employees having the ability to access business environments using mobile devices and other device types, today’s network perimeter has shifted to the endpoint. An Endpoint Protection Platform (EPP) provides a holistic approach to cybersecurity that takes into consideration today’s shift to the cloud and end user device-centric productivity. What is an endpoint protection platform? How does it compare with traditional security solutions?

read more
Zerologon Windows Vulnerability: What Is It and How to Tackle It?

Zerologon Windows Vulnerability: What Is It and How to Tackle It?

On top of dealing with a global pandemic and the challenges that working from home poses for IT administrators, the past few months have seen quite a few alarming vulnerabilities. One of the most critical was announced in August of this year and dubbed the Zerologon vulnerability. What is it and how can organizations ensure the remote workforce is patched and safe from Zerologon?

read more
What Machine Learning Means for Endpoint Security in 2020

What Machine Learning Means for Endpoint Security in 2020

Cybersecurity threats are some of the most worrisome that are facing businesses today. The risk of a cybersecurity event that leads to data leaks or data loss is very real and the effects can be catastrophic. Attackers today are making use of often very sophisticated tools and attack techniques. To effectively win today’s cybersecurity war facing your organization, artificial intelligence (AI) and machine learning (ML) in endpoint security is a must. Let’s take a look at how AI and ML are being used in this space as an effective weapon against security compromise.

read more
5 Strategies to Improve Your IT Management and Endpoint Security Tactics

5 Strategies to Improve Your IT Management and Endpoint Security Tactics

With people across the world encouraged to stay at home to do their part in slowing the spread of COVID-19, many employees are currently working from home. Given the rise of remote workers, addressing security vulnerabilities and organizing software updates have become a top challenge for companies. Organizations need to rapidly incorporate strategies to enhance their IT asset management software.

read more
What is IT Asset Management: Defining ITAM

What is IT Asset Management: Defining ITAM

IT asset management is not yet another buzzword but a real set of practices that can help your organization maximize the use of IT resources and avoid potential risks. Sounds interesting? This post will introduce you to IT asset management (ITAM) and help you navigate your way towards a tangible management strategy.

read more