Urgent Call from Barracuda: Replace Your Email Security Gateway Now

Posted Posted in Uncategorized

In an unprecedented move that has taken the cybersecurity world by storm, Barracuda Networks has urgently called upon its customers to immediately replace their existing email security gateways (ESGs) due to a serious security vulnerability, identified as CVE-2023-2868. This news is especially significant, considering that evidence shows the vulnerability has been actively exploited since October […]

10 Critical Steps to Survive a Ransomware Attack, Step 6: Restrict Access to File Shares (aka “Silo Your Data”)

Posted Posted in Ransomware, Security, Uncategorized

10 Critical Steps to Survive a Ransomware Attack, Step 6: Restrict Access to File Shares (aka “Silo Your Data”) Most small firms we work with have a single file repository on their network, and every staff member has full access to it, and all of its contents. This means that anyone, from the CEO all […]

10 Critical Steps to Survive a Ransomware Attack, Step 4: Configure Your Firewall to Filter OUTbound Traffic.

Posted Posted in Ransomware, Security, Uncategorized

A firewall is a type of security device that blocks network traffic to and from unauthorized sites, and allows traffic to authorized sites. Firewalls range from high end devices designed to protect the likes of Amazon and Facebook, down to SOHO (Small Office/Home Office) devices from Linksys. While there is a tremendous range of features […]

10 Critical Steps to Survive a Ransomware Attack, Step 2: Patch, Patch, Patch.

Posted Posted in Ransomware, Security, Uncategorized

What are software patches? Patches are fixes for “bugs,” or flaws in programs. While some people still like to say “computers don’t make mistakes,” one must remember that computers are designed, built, and programmed by humans… and humans certainly make mistakes. Software patches are created when a problem is found, and the author of the […]