K2000 Kloser Look: Preventing Microsoft Account Sync in Windows 8.x
A new feature with Windows 8 allows the synchronization of applications and system configurations across different computers. This is convenient, as it allows a user to login to a new set of hardware...
View ArticleNew Internet Explorer Zero-Day Exploit
On April 26th Microsoft released Security Advisory 2963983 in response to a vulnerability in Internet Explorer that has the potential to allow remote code execution. This is a zero day exploit meaning...
View ArticleHow Crooks Cash in on Stolen Data — Trends Altering the IT Security Landscape
In our last post, we talked about the Internet of Things , and how the addition of multiple new smart devices to your network can result in more opportunities for hackers to hijack your data and use it...
View ArticleHow IT Security Roles are Changing in the Face of Broader Risk Issues
We’ve recently discussed how trends such as the Internet of Things and mobility have affected IT security. We’ve also touched on ways that more thorough measures can be implemented to rise to the...
View ArticleWhat are Vulnerability Scans, and How Can They Help Your Security Efforts?
We’ve posted earlier about how hackers get into your systems and steal data from your endpoints, and then how they monetize this stolen information. If you have thousands of unsecured mobile endpoints...
View Article