Let us be your IT department!
Call us Today! (703) 821-8200

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

Only 15 of the vulnerabilities affected Windows itself, but the others addressed issues with other Microsoft products, including Internet Explorer, Microsoft Edge, SharePoint, SQL Server, Hyper-V, and Kernel. Yet, only two of these flaws affected every single version of Windows and Windows Server, and none of them were being exploited in the wild by hackers.

One of these vulnerabilities demands your immediate attention, though, and that is the one that has your Windows Search feature in its crosshairs. This vulnerability, coded by Microsoft as CVE-2017-8620, can use the Server Management Block (SMB) to remotely control a system, be it a Windows Server unit or a Windows workstation. Since the flaw isn’t located in SMB itself, it isn’t affected by other threats like the notorious WannaCry ransomware and NotPetya.

This Windows advisory claims that the vulnerability takes advantage of the way that Windows Search works with objects in memory. A hacker can send customized messages through the Windows Search function to change user permissions. They can then take full advantage of their permissions to install, remove, or change applications on any infected device. They can also view, change, or delete any data that’s stored on it, or create a new account just for them with full administrator privileges.

A vulnerability like this is exactly what a hacker wants. They can basically take full control over a victim’s computer with minimum trouble. If you implement patches and security updates as they are released, you shouldn’t have anything to worry about. Does your business have an organized approach to implementing security patches? If not, there are solutions available that you can use to keep security at a maximum.

Outsourced IT often includes remote patching and maintenance that can be used, even by small businesses. Even better, it does this without costing your business an arm and a leg. Enterprise-level solutions are often the only way for your business to thrive in a world filled with competition, but that’s because they provide a significant benefit to your organization that you can’t afford to ignore. We can improve your network security in the same way as an internal IT department, but without the costs associated with adding new salaries to your budget. Computerware can help your organization implement new security solutions like remote monitoring and maintenance. To learn more, reach out to us at (703) 821-8200.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 September 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Workplace Tips Productivity Software Business Computing Backup Hackers Data Saving Money Hardware Business Malware Email IT Support IT Services Hosted Solutions Efficiency Google Quick Tips Gadgets Smartphones Business Continuity Small Business Mobile Devices Mobile Office Disaster Recovery Computer User Tips Virtualization Microsoft Office Server Network Network Security Miscellaneous Upgrade VoIP Social Media Windows 10 Windows Unified Threat Management Mobile Device Management Smartphone Operating System Innovation Communication Ransomware WiFi Remote Computing Vendor Management Passwords BYOD Android Apps The Internet of Things Mobile Computing Marketing Remote Monitoring Managed IT services Facebook Users History Holiday Firewall Analytics Data Management Apple Collaboration IT Consultant Save Money Alert Content Filtering Bring Your Own Device Managed IT Services Office Health Automation Big data Outsourced IT Best Practice BDR Spam Going Green Windows 8 Wireless Technology Tech Support Search Phishing Hiring/Firing Productivity Lithium-ion Battery Outlook Hard Drives Virus App Phone System Data Backup Budget Managed IT Information Technology IBM IT Support Printer Internet of Things Gmail Encryption Recovery Browser Employer-Employee Relationship Help Desk Antivirus Customer Service Data storage Education Humor Saving Time Save Time SaaS Money Bandwidth Running Cable Proactive IT Administration Maintenance Computers Artificial Intelligence communications Tablet iPhone Securty Business Intelligence Two-factor Authentication Solid State Drive Wireless Flexibility Website Document Management Fax Server Travel Mobile Device It Management Computer Repair Hard Drive Legal Hacking Intranet Avoiding Downtime Windows 10 Office 365 Update Hosted Solution Current Events User Digital Payment DDoS Black Market Data Recovery Government PowerPoint Networking Word Social Networking Risk Management Telephone Systems Password VPN Training Twitter Hacker Presentation Net Neutrality Law Enforcement Company Culture Co-managed IT Politics Virtual Desktop Documents Programming Public Cloud Heating/Cooling Lifestyle Laptop Cybersecurity Trending Retail Mobility Experience Statistics Office Tips Automobile Paperless Office Sports Streaming Media Computing How To Inbound Marketing Pain Points Robot IT service Start Menu Taxes Safety Chrome Excel User Error Compliance Social Router Uninterrupted Power Supply Computer Accessories Network Congestion Customer Relationship Management Gaming Console Comparison Augmented Reality Cybercrime Webcam Business Growth Telephony Monitors Text Messaging Cortana Cost Management YouTube Cloud Computing Settings Hack Processors Downtime Disaster USB End of Support Administrator IP Address Language Pirating Information Permissions Adminstration Supercomputer Human Resources Business Metrics switches Emergency Worker Machine Learning Writing Distributed Denial of Service Content Management Skype Google Drive Employer Employee Relationship Chromebook Teamwork Licensing Messenger Botnet Work/Life Balance Storage Video Surveillance Cryptocurrency Electricity LinkedIn Download Harddrive PDF Google Docs Saving ZTime Best Available IT consulting Business Technology Books Keyboard Computer Malfunction Domains Archive External Harddrive Debate Cleaning Product Reviews WannaCry CIO Time Management Microchip eWaste Read Point of Contact Regulations Value Windows XP Scam Reading Shortcut Motion Sickness Smart Phones Troubleshooting Society Get More Done Thin CLient Touchscreen Tracking Staffing Hacks Environment Micrsooft Printer Server Knowledge Relocation Competition Web Server Identity Theft Business Owner Digital Leadership Websites Workers Notifications Tech Terms Reliable Computing Application Virtual Reality Specifications Device Management Music Access Software as a Service Samsung Social Engineering Upselling Upgrades Webinar Bluetooth Digital Signature LiFi G Suite Physical Security online Currency Computing Infrastructure Entertainment Spyware Tablets Rental Service Deep Learning Memory Visible Light Communication Data Protection Sync CCTV Wi-Fi Mouse Best Practives Analytic cache Patch Management Google Maps Public Speaking Flash Microserver Advertising GPS Corporate Profile In Internet of Things Emails Google Wallet Assessment Redundancy Scalability Entrepreneur Displays Turn Key HIPAA Ebay Unified Communications Business Managemenet 3D VoIP Consultation Meetings Banking Electronic Payment Recycling Drones Trojan Organize Project Management Cabling File Sharing Private Cloud Capital Productuvuty Vulnerability 3D Printing CrashOverride

hp supplies medallionLarge2017