Blog

By Ed Bratter, Posted in Infrastructure

Microsoft OneNote is a popular program for taking and sharing notes. One challenge with OneNote though is moving or migrating notebooks. This challenge has become amplified because Microsoft has changed the options available for moving notebooks through the various flavors and versions of OneNote over the years. There is also confusing documentation on how to move notebooks. Hopefully this blog will provide some clarity. A quick lesson on OneNote files: A given notebook is a collection of files that are st... read more.

  • January 22, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/8 A Former Hacker Explains How to Fight Ransomware (Pure Storage) Cybercriminals are becoming increasingly bold these days, evolving their tactics and attacks as fast as we can evolve our defenses. What if, in the ongoing war against cybercrime, you could get intel on what they’re up to straight from a former hacker? Now you can. https://blog.purestorage.com/perspectives/a-former-hacker-explains-how-to-fight-ransomware/ Cybersecurity Stop of the Month: MFA Manipulation (Proofpoint) This... read more.

  • January 19, 2024

By Steve Gold, Posted in Security

In the film "The Dark Knight," the character of Batman (played by Christian Bale) uses an advanced surveillance system called the "Bat-Sonar." This technology enables him to turn every cell phone in Gotham City into a high-frequency microphone, creating a real-time audio surveillance network. Batman activates this system to locate the Joker and gather vital information to prevent his destructive plans. Batman's Bat-Sonar provides real-time information that allows him to respond swiftly to emerging threats.... read more.

  • January 16, 2024

By Steve Gold, Posted in Security

“This is the way” is part of the Mandalorian creed. In the popular Star Wars series “The Mandalorian,” we follow a lone bounty hunter known as Din Djarin. Din Djarin wears a helmet and adheres to a strict code of conduct as a member of the Mandalorian. Much like Din Djarin's helmet, which protects his identity and records his journey, an audit log collects data and records every event within an organization's digital assets. Every action taken within the digital environment is logge... read more.

  • January 09, 2024

By Steve Gold, Posted in Security

PC Load Letter. The “Check Engine” light of the HP LaserJet II, III, and IV models. This message was supposed to mean Paper Cassette Load Letter and indicate that there was no letter sized paper in the Paper Cassette. What it actually meant was both everything and nothing. It could’ve meant that the manual paper tray was open, empty, had the wrong paper, or like all electronics, needed to be rebooted. This “error message” became very popular in the movie Office Space. Office S... read more.

  • January 03, 2024

By Steve Gold, Posted in Security

If you’re a Mandy Patinkin fan like I am, you can quote many lines from The Princess Bride and have watched the acclaimed series Homeland, where he played CIA Director, Saul Berenson. In Season 7 of Homeland, Saul Berenson’s phone gets hacked because it is running outdated software. This scenario highlights several key points relevant to the importance of regular updates and patches. Exploitation of Vulnerabilities: The show demonstrates how hackers can exploit vulnerabilities in s... read more.

  • December 19, 2023

By Timothy Karl, Posted in Infrastructure

Overview Up until now, companies that were using Workspace on Citrix Cloud had to use a generic URL on the cloud.com domain. Citrix now gives you the ability to use a customer-owned domain, which helps with corporate branding, and makes it easier for users to remember the URL. It also helps with companies that are migrating from a NetScaler Gateway to Workspace, as they can migrate over their existing Gateway URL. For example, users at a company named AstraForge would typically access Workspace using a ge... read more.

  • December 19, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/11 Why Ransomware Actors Abuse Legitimate Software (CyberArk) Abusing organizations’ existing enterprise tools can help attackers blend in while they’re doing reconnaissance, and also aids them with privilege escalation and persistence. Coupling this technique with ransomware as a service (RaaS) also lowers the bar to entry by eliminating the need for attackers to create malware – something that requires skills, resources and time. https://www.cyberark.com/resources/blog/why-r... read more.

  • December 15, 2023

By Steve Gold, Posted in Security

So how does a round trip flight to Mars, with an extended layover for one lucky astronaut, relate to establishing a remediation process around vulnerabilities? Mark Watney, played by Matt Damon, finds himself stranded on Mars after his crew mistakenly believes he died during a severe storm and leaves the planet without him. The movie follows Watney as he faces numerous challenges and risks associated with survival on Mars. His approach to these challenges can be likened to a risk-based remediation strategy... read more.

  • December 12, 2023

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/4 Check Point Research Navigates Outlook’s Security Landscape: The Obvious, the Normal, and the Advanced (Check Point) Check Point Research (CPR) conducted a comprehensive analysis on ‘Outlook’, the desktop app in the Microsoft office suite, providing deeper insights into attack vectors, aiding both users and the security industry in understanding and mitigating potential risks. https://blog.checkpoint.com/security/check-point-research-navigates-outlooks-security-landscape-the... read more.

  • December 08, 2023