Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/27 Google Issues Warning For 2 Billion Chrome Users Google published the news in a new blog post, where it revealed Chrome’s 11th ‘zero day’ exploit of the year has been found (CVE-2021-37973) and it affects Linux, macOS and Windows users. https://bit.ly/3AMEdSI Citrix Workspace SAML 2.0 support is now generally available With Citrix Workspace supporting SAML 2.0, you can seamlessly integrate users via Single Sign-On (SSO) with a broad range of identity and authentication pro... read more.

  • October 04, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/20 Don’t Let Cybersecurity Cracks Become Major Breaches (CyberArk) By maximizing your endpoint security posture with a layered security approach, your organization can reduce risk and uncertainty and protect your digital “house”. https://bit.ly/2XFZA9X How to Mitigate an Accidental Insider Threat (Proofpoint guest blog) Though malicious insider threats often get the most attention, they only comprise 14% of all insider threat incidents. Accidental insider threats, however, ac... read more.

  • September 24, 2021

By Gotham, Posted in Security

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Today’s organizations face a variety of challenges and security risks, ranging from ransomware to phishing campaigns. For this reason, many organizations invest significant time and resources to detect and prevent external threats. But one area that is often overlooked is the insider threat. There are three primary types of insider threats: Malicious:... read more.

  • September 20, 2021

By Gotham, Posted in Security

This is a guest blog from Proofpoint, a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Today’s organizations face a variety of challenges and security risks, ranging from ransomware to phishing campaigns. For this reason, many organizations invest significant time and resources to detect and prevent external threats. But one area that is often overlooked is the insider threat. There are three primary types of insider threats: Malicious:... read more.

  • September 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 9/13 So your company just upgraded to Citrix Workspace. Now what? Citrix Workspace comes with a suite of tools to make your job easier — and your employees’ jobs. Now you can manage web and SaaS apps alongside the Windows apps you’ve been managing within Citrix Virtual Apps and Desktops. https://bit.ly/2XihZJC New Application Security Report Outlines the Biggest Challenges for DevSecOps (Fortinet) For business-critical workflows, organizations look to enable access from any dev... read more.

  • September 17, 2021

By Timothy Karl, Posted in Infrastructure, Storage, Support

One of the common issues I see in VDI are FSLogix profile disks taking up a lot of space. Users’ profiles grow organically over time as they use VDI. If an IT administrator doesn’t monitor and perform regular maintenance on the profile shares, they can run out of space. When this happens, users are unable to log on and active profiles start to become corrupted. Adding more storage can temporarily get things back online; however, that might not always be an option as adding more storage and expan... read more.

  • September 16, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/30 What’s new with Citrix Workspace – August 2021 Recently, our teams have added new features and solutions associated with some of our most popular services. These are designed to improve the hybrid experience. Let’s dive in and take a closer look at what’s new with Citrix Workspace for August. https://bit.ly/3gKfGFW Pandemic-Related Email Scams Are on the Rise (Proofpoint) As vaccines became widely available in the spring and early summer, COVID concerns dwindled dram... read more.

  • September 10, 2021

By Nancy Rand, Posted in Security

The PCI Council has published a series of blogs on payment data security as part of their task force for small merchants.  Topics include: Back-to-Basics: Think Before You Click Back-to-Basics: Properly Configured Firewalls Back-to-Basics: Secure Remote Access Back-to-Basics: Use Strong Encryption Back-to-Basics: Keep Software Patched Back-to-Basics: Use Strong Passwords Back-to-Basics: Reduce Where Payment Data Can Be Found PCI SSC Shares Resources for Navigating Changing Payment Environmen... read more.

  • September 08, 2021

By Nancy Rand, Posted in Infrastructure, Security

On August 5, 2021, the PCI DSS Council and the Cloud Security Alliance (CSA) issued a joint statement on the importance of cloud scoping. https://www.pcisecuritystandards.org/about_us/press_releases/pr_08052021 https://www.pcisecuritystandards.org/pdfs/PCI_Cloud_Security_Alliance_Cloud_Bulletin.pdf Best practices focus areas are discussed: Data protection, Authentication, Systems management, DevOps & DevSecOps, Data governance and Resiliency. These best practices are important to the security of clou... read more.

  • September 02, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 8/23 Check Point Research: Education sector sees 29% increase in attacks against organizations globally Check Point Research (CPR) today reports that since mid-2020, we are seeing a steady increase in the weekly number of cyberattacks per organization globally, with the education/research sector being impacted at a higher rate than others. https://bit.ly/3jabv80 The Need for Endpoint Security Isn't Going Away (Fortinet) The combination of the work from anywhere workforce and the growing sophisti... read more.

  • August 27, 2021