Blog

By Steve Gold, Posted in Security

The documentary "Zero Days" sheds light on the complexities of cybersecurity threats, such as the Stuxnet virus, which targeted industrial systems. The film exemplifies the sophisticated nature of modern cyberthreats and underscores the necessity of robust security measures like Domain Name System (DNS) filtering. The case of Stuxnet is a testament to the fact that no enterprise is immune to cyberthreats and proactive measures are essential. The Role of DNS Filtering in Enterprises: Blocking Access to Ma... read more.

  • February 06, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/29 Evergreen//One Recognized as DCIG TOP 5 Storage as-a-Service Solution (Pure Storage) The Data Center Intelligence Group (DCIG) recently recognized Evergreen//One™ from Pure Storage as a DCIG TOP 5 solution in the 2022-23 DCIG TOP 5 Enterprise Storage as a Service Solutions report. https://blog.purestorage.com/products/evergreen-one-recognized-as-dcig-top-5-storage-as-a-service-solution/ 5 Common Privilege Escalation Attack Techniques with Examples (Proofpoint) Privilege escalation is... read more.

  • February 02, 2024

By Steve Gold, Posted in Security

I recently became a fan of “Black Mirror” and especially the above named episode. In this episode, the story revolves around a young man named Kenny who becomes the victim of a malicious hacker group. Kenny's life takes a dark turn when he is caught in a web of cybercrime after his computer is compromised and he is blackmailed through his browser and email client. Infection and Surveillance: Kenny's computer is infected with malware that allows the hacker group to monitor his online activiti... read more.

  • January 30, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/22 Moving OneNote Notebooks Microsoft OneNote is a popular program for taking and sharing notes. One challenge with OneNote though is moving or migrating notebooks. This challenge has become amplified because Microsoft has changed the options available for moving notebooks through the various flavors and versions of OneNote over the years. There is also confusing documentation on how to move notebooks. Hopefully this blog will provide some clarity. https://www.gothamtg.com/blog/moving-onenote-no... read more.

  • January 26, 2024

By Steve Gold, Posted in Security

In Episode 18 of Season 5 of “Star Trek: The Next Generation,” the USS Enterprise becomes ensnared in a time loop, a phenomenon that causes the ship to repeatedly experience the same sequence of events. This time loop not only endangers the ship, but also poses a severe threat to the crew's safety and the ship's mission The character Data, played by Brent Spiner, is an android with a positronic brain that enables him to retain memories in ways that the rest of the crew cannot. As the time loop... read more.

  • January 23, 2024

By Ed Bratter, Posted in Infrastructure

Microsoft OneNote is a popular program for taking and sharing notes. One challenge with OneNote though is moving or migrating notebooks. This challenge has become amplified because Microsoft has changed the options available for moving notebooks through the various flavors and versions of OneNote over the years. There is also confusing documentation on how to move notebooks. Hopefully this blog will provide some clarity. A quick lesson on OneNote files: A given notebook is a collection of files that are st... read more.

  • January 22, 2024

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/8 A Former Hacker Explains How to Fight Ransomware (Pure Storage) Cybercriminals are becoming increasingly bold these days, evolving their tactics and attacks as fast as we can evolve our defenses. What if, in the ongoing war against cybercrime, you could get intel on what they’re up to straight from a former hacker? Now you can. https://blog.purestorage.com/perspectives/a-former-hacker-explains-how-to-fight-ransomware/ Cybersecurity Stop of the Month: MFA Manipulation (Proofpoint) This... read more.

  • January 19, 2024

By Steve Gold, Posted in Security

In the film "The Dark Knight," the character of Batman (played by Christian Bale) uses an advanced surveillance system called the "Bat-Sonar." This technology enables him to turn every cell phone in Gotham City into a high-frequency microphone, creating a real-time audio surveillance network. Batman activates this system to locate the Joker and gather vital information to prevent his destructive plans. Batman's Bat-Sonar provides real-time information that allows him to respond swiftly to emerging threats.... read more.

  • January 16, 2024

By Steve Gold, Posted in Security

“This is the way” is part of the Mandalorian creed. In the popular Star Wars series “The Mandalorian,” we follow a lone bounty hunter known as Din Djarin. Din Djarin wears a helmet and adheres to a strict code of conduct as a member of the Mandalorian. Much like Din Djarin's helmet, which protects his identity and records his journey, an audit log collects data and records every event within an organization's digital assets. Every action taken within the digital environment is logge... read more.

  • January 09, 2024

By Steve Gold, Posted in Security

PC Load Letter. The “Check Engine” light of the HP LaserJet II, III, and IV models. This message was supposed to mean Paper Cassette Load Letter and indicate that there was no letter sized paper in the Paper Cassette. What it actually meant was both everything and nothing. It could’ve meant that the manual paper tray was open, empty, had the wrong paper, or like all electronics, needed to be rebooted. This “error message” became very popular in the movie Office Space. Office S... read more.

  • January 03, 2024