Don't virtualize without answers

Posted on Wednesday December 02, 2015

Virtualization_Dec2_AFor small or medium-sized business, getting a leg up on the competition can be the difference between simply surviving and thriving. One way of doing this is by embracing virtualization. Many SMBs have used virtualization techniques to great effect, but implementing a change can be difficult and time-consuming. Here are a few questions you should ask before virtualizing your office.

 

3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0

Posted on Monday November 30, 2015

Revision Note: V1.0 (November 30, 2015): Advisory published.
Summary: Microsoft is aware of unconstrained digital certificates from Dell Inc. for which the private keys were inadvertently disclosed. One of these unconstrained certificates could be used to issue other certificates, impersonate other domains, or sign code. In addition, these certificates could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against Dell customers. This issue affects all supported releases of Microsoft Windows. Microsoft is not currently aware of attacks related to this issue.

 

Samsung Pay expands payment options

Posted on Friday November 27, 2015

AndroidPhone_Nov5_AMobile payment systems have been making great strides in recent years, and are quickly becoming the norm for consumers looking to quickly settle bills for small amounts. While Google Wallet and Apple Pay may be leading the movement to disrupt the payments industry and make the most of NFC technologies, Samsung's own mobile payment solution is also beginning to make inroads. The latest news that Samsung Pay has added support for eight more credit and debit card issuers will take progress up a notch.

 

4 facts about HIPAA and your IT

Posted on Friday November 27, 2015

While HIPPA's implementation in relation to technology has been problematic to say the least, things have become much clearer over the course of the past year. However, there are still a few areas in which your office might not be compliant. This isn't necessarily through negligence on your part, but rather simply a lack of understanding as to the requirements. We look at four facts your practice should know about HIPAA and your IT.

 

Your guide to smart BI planning

Posted on Monday November 16, 2015

You have finally decided your small or medium-sized business is ready to utilize Business Intelligence (BI) software. This is a big step for your company and one that must be approached with diligence. If you are not careful the cost of BI software, not to mention training, could far outweigh the actual benefits you end up receiving. However, with thoughtful BI planning, you are likely to see results you would have never thought possible.

 

3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0

Posted on Tuesday November 10, 2015

Revision Note: V1.0 (November 10, 2015): Advisory published.
Summary: Microsoft is announcing the availability of a security update for Windows Hyper-V to protect against a denial of service condition that can be triggered with certain central processing unit (CPU) chipsets. Although the weakness resides in the chipset, Microsoft is issuing this security update to protect customers. The update prevents guests on a Hyper-V system from triggering a weakness in the CPU that could allow instructions from a Hyper-V guest to place its Hyper-V host's CPU into an unresponsive state, leading to a denial of service condition for the guest operating systems running on the affected host. Successful exploitation of the CPU weakness would require kernel-mode code execution privileges on the guest operating system.

 

Page:   1...303304305306307308309310311...315

Celebrating 35+ Years

Off-Site Cloud Backups

Contact Us

Support Ends for Windows 10 22H2, Windows Server 2012 R2, Exchange 2013, Office 2016