Blog

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/14 Identify and Investigate Business Email Compromise (BEC) Scams (Varonis) According to the FBI's recent IC3 report, Business Email Compromise was responsible for causing over $1.8 billion worth of losses to businesses in 2020, which greatly exceeds the losses attributed to other more publicized forms of cybercrime like ransomware ($29 million). https://bit.ly/350pUPy Cyber Operational Collaboration Is Key for the “Next Log4j” Response (Palo Alto Networks) A quick glance at cybers... read more.

  • February 18, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 2/7 New FortiGate 3000F Series Secures Digital Acceleration for Hybrid IT (Fortinet) The FortiGate 3000F is the latest addition to the NGFW portfolio, designed to help customers secure today’s hybrid IT campus and data center architectures. https://bit.ly/3GrL4Db Citrix EPA issue with Chrome/Edge 98 – Fixed with Microsoft Endpoint Manager Due to a new security feature in both Chrome and Edge version 98 (they both share the Chromium code), EPA (Endpoint Analysis) will no longer launch... read more.

  • February 11, 2022

By Brian Wagner, Posted in Support

Due to a new security feature in both Chrome and Edge version 98 (they both share the Chromium code), EPA (Endpoint Analysis) will no longer launch through the browser. Citrix released this article: EPA fails after Chrome/Edge version 98 upgrade (citrix.com) The article states that the work around is to add your gateway FQDN to the “InsecurePrivateNetworkRequestsAllowedForUrls” policy for both Chrome and Edge. While this sounds easy enough, the change needs to be made on a remote machine (pre... read more.

  • February 07, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/31 CISA Releases Incident And Vulnerability Response Playbooks To Strengthen Cybersecurity For Federal Civilian Agencies “The playbooks we are releasing today are intended to improve and standardize the approaches used by federal agencies to identify, remediate, and recover from vulnerabilities and incidents affecting their systems,” said Matt Hartman, Deputy Executive Assistant Director for Cybersecurity. https://bit.ly/343VLyw Hybrid work is here to stay, and that’s a good t... read more.

  • February 04, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/17 Threat Update 71 – Security Predictions for 2022 (Varonis) 2021 was a challenging year for security professionals – the attacks and vulnerabilities seemed bigger and occurred more frequently. https://bit.ly/3fzpEc2 DHL Replaces Microsoft as Most Imitated Brand in Phishing Attempts in Q4 2021 (Check Point) In Q4, global logistics and distribution company DHL ended Microsoft’s long-standing reign as the brand most frequently imitated by cybercriminals in attempts to steal cr... read more.

  • January 28, 2022

By Timothy Karl, Posted in

Historically, it has been complicated and challenging to manage VDI images across on-premises resource locations and across public clouds, with lots of different platforms, tools, and technologies involved. There are vendor specific components that are always changing and evolving. It is not a seamless experience. Citrix Image Portability Service for Citrix Virtual Apps and Desktops (CAVDS) helps solve this problem. It is a new Citrix Cloud service in tech preview that allows you to migrate images from on-... read more.

  • January 27, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/10 What’s new with Citrix Workspace At Citrix, we continue to modernize workflows in our portfolio of product solutions to ensure customers receive a great digital experience regardless of device, location, time, or network. https://bit.ly/3nbNS0k Check Point Research: Cyber Attacks Increased 50% Year over Year Check Point Research (CPR) today reports that from mid-2020 throughout 2021, there has been an upwards trend in the number of cyber-attacks. This trend reached an all-time high at... read more.

  • January 14, 2022

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/20 How to drive innovation and productivity for your distributed workforce (Citrix) Delivering a secure and productive hybrid-work experience that drives innovation everywhere is one reason Citrix created Citrix Workspace. To make it simpler than ever to support hybrid-work innovation and collaboration, Citrix Workspace empowers distributed workforces with a unified and streamlined work experience. https://bit.ly/3pcMEmZ Brute Force Attack: Definition, Types, and Prevention (Varonis) While th... read more.

  • January 07, 2022

By Michael Hawkins, Posted in Security

It is that time of the year when the festive spirit comes out of all of us and we spend additional time with our families and friends. At the same time though, hackers and criminals become more focused on finding ways to wreak havoc or extort ransom money from unprepared victims. It is for that reason that we are taking a quick look at three key security technologies that are a crucial part of any ransomware strategy. Data Loss Prevention (DLP) Data that is exfiltrated from an organization and falls into... read more.

  • December 20, 2021

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/13 EDR vs Enterprise Antivirus: What’s the Difference? (SentinelOne) For decades, organizations and businesses have invested in Antivirus suites in the hope of solving the challenges of enterprise security. But as the sophistication and prevalence of malware threats has grown over the last ten years, so the shortcomings of what is now referred to as “legacy” Antivirus have become all too apparent. https://bit.ly/3EUj8aQ Protect Yourself Against The Apache Log4j Vulnerability... read more.

  • December 20, 2021