About tlgadmin

This author has not yet filled in any details.
So far tlgadmin has created 185 blog entries.

Will Patching Break My Network?

IT organizations understand the importance of applying current security updates, or "patches", to the operating systems and software applications running in their environment. However, many are reluctant to do so for fear of "breaking" their systems and causing outages. And, [...]

Will Patching Break My Network?2020-03-27T17:26:27-07:00

Why Don’t IT Departments Fully Patch Their Environments?

The failure to fully apply security updates (patches) to operating systems and software applications is the leading cause of cybersecurity compromise. A recent survey by Ponemon Institute of over 3,000 organizations, found that half had experienced a cybersecurity breach in [...]

Why Don’t IT Departments Fully Patch Their Environments?2020-03-27T17:28:15-07:00

Should I buy cyber insurance?

A friend of mine asked me if he should buy cyber insurance for his business. Whether your need is for a self-hosted/owned, cloud or hybrid infrastructure this is not an easy answer. As I thought about it, I decided this is probably a topic of interest to many financial managers at small to mid-size enterprises. How should you decide this question and who can you seek for legitimate counsel that is qualified to answer this question without having a conflict of interest?

Should I buy cyber insurance?2020-02-04T01:55:28-08:00

Preventable ransomware attack leads to unrecoverable $700,000 loss

A 10 attorney law firm discovered the cost of failing to protect its systems from ransomware the hard way.  An attorney clicked on a phishing e-mail, leading to a ransomware attack.  The firm apparently did not have a [...]

Preventable ransomware attack leads to unrecoverable $700,000 loss2021-10-05T01:10:36-07:00

What changed in NIST 800-171 r1?

If you must comply with NIST 800-171 under DFARS you may wonder what has changed with the first revision, released in December, 2016.  There are two substantive changes:  "Information Systems" has been replaced by "Systems" throughout the document.  This mean the [...]

What changed in NIST 800-171 r1?2017-07-10T21:15:22-07:00

Endgame on how Wannacry ransomware works

There has been a lot of discussion about the method of propagation and the overall impact of this ransomware, but what does this ransomware actually do from start to finish?  Click HERE or on the image below to see the [...]

Endgame on how Wannacry ransomware works2017-06-29T15:23:51-07:00

Wannacry ransomware’s rich cousin – Is your computer mining money for hackers?

Here are a couple of snippets from Perth Now Sunday Times in Australia ANOTHER large-scale, stealthy cyber-attack is underway on a scale that could dwarf last week’s assault on computers worldwide. The new attack targets the same vulnerabilities the WannaCry [...]

Wannacry ransomware’s rich cousin – Is your computer mining money for hackers?2017-09-17T23:54:14-07:00

How do I prevent WannaCry ransomware?

Dear Valued Client,

Before we begin, if at any point while reading the message below, you need assistance or are just not sure, call 877-662-6624 or contact us by email and let us know so we may assist you. If you are one of our Patchworx clients or that rare organization that is covered through other effective measures, we sincerely congratulate you for your efforts to protect your company.

Whether you request our assistance or do the work of protecting yourself, not acting could be a very costly choice.

Critical news:

As you have likely heard in the national news, networks all over the world (in more than 150 countries) have been infected by WannaCryp Ransomware also known as WannaCry since Friday 5/12/2017…in fact it is estimated that 100s of thousands of computers are already infected and potentially million more will soon be. So, before we move into the details of why this matters, please DO NOT OPEN any attachments, click on links in emails from unknown senders, bring in un-scanned USB drives or otherwise invite an infection into your network.

 

What does ransomware do?

There are different types of ransomware but, all of them will prevent you from using your PC or server normally. They will then ask you to do something such as pay money before you can access your systems and data. Not all but most make getting data back impossible without

How do I prevent WannaCry ransomware?2017-06-29T14:32:15-07:00

Ransomware Training for End-Users – Be Ransomware Aware

Educate your users - Don’t let them be tricked into downloading ransomware/malware

 Everyone should follow this advice:

  1. Be very cautious when opening an attachment or clicking a link in an email, instant message, or post on social networks (like Facebook)—even if you know the sender. If you are suspicious, call to ask the sender if they sent it.  If not, delete it.
  2. The attack can look like it is from an official sources like banks, UPS, FedEx, USPS, eFax, etc. This has been the most common attack method to date.
  3. If an e-mail gets blocked and quarantined by your spam filter, be very certain about the message and any attachments before you release it from quarantine.  One user recently got burned this way.
  4. Avoid clicking Agree, OK, or I accept in banner ads in unexpected pop-up windows with warnings or offers to remove spyware or viruses, or on websites that may not seem legitimate. These are usually bogus. Call your IT specialist if you are concerned.
Ransomware Training for End-Users – Be Ransomware Aware2021-01-28T20:16:40-08:00

What changed in NIST 800-171r1?

If you must comply with NIST 800-171 under DFARS you may wonder what has changed with the first revision, released in December, 2016.  There are two substantive changes: 1.  "Information Systems" has been replaced by "Systems" throughout the document. [...]

What changed in NIST 800-171r1?2023-02-07T07:46:22-08:00