Pelstar Computer Systems kindly urges all users to update Microsoft Outlook after the discovery of a critical vulnerability, CVE-2023-23397, in the email client that attackers are actively exploiting in the wild. Microsoft released a patch for the privilege escalation vulnerability on Tuesday as part of its monthly security update. Along with the patch, Microsoft released […]
Category: Managed IT
Managed IT Services are for businesses whom are looking to outsource their responsibility of maintaining information technology networks, and anticipating the need for, a range of processes and functions, in order to improve operations and reduced budgetary expenditures, through the reduction of directly-employed staff. Managed IT services are for a more profitable business, ready to scale as you grow for years to come. Learn all you need to know about the MSP industry and Managed Information Technology services and why you need might need them.
Microsoft Access Control Abuse
An access control gap in Microsoft‘s Active Directory (AD) service may allow users within Windows environments to access domains beyond those for which they are authenticated, all while IT admins are none the wiser. AD, Microsoft’s catchall identity management service for authenticating computers, printers, users, or really anything participating in an IT environment, is built […]
Zero-Day Bugs Allow Security Feature Bypass in Microsoft Applications [March 2023]
IT teams should prioritize the patching of two zero-day vulnerabilities, one in Microsoft Outlook’s authentication mechanism and another that’s a Mark of the Web bypass, security experts said today. The two are part of a cache of 74 security bugs that Microsoft disclosed in its March Patch Tuesday security update. In a blog post, researchers […]
Read More… from Zero-Day Bugs Allow Security Feature Bypass in Microsoft Applications [March 2023]
Ransomware Attacks on Schools
Ransomware Cyberattacks on Schools Ransomware Cyberattacks on Public Schools OMG! Public school districts tend to fall below what is commonly called the “cybersecurity poverty line,” a haves-and-have-nots division between organizations equipped with the resources to implement strong security measures and those challenged by insufficient IT budget, expertise, and other factors. A large company can afford […]
Why Your Organization Needs Zero Trust Security
Zero Trust adoption and your Company Did you know, the cyberthreat landscape is getting more complicated year after year, cybersecurity deserves our attention more than ever before. Fully trusting applications, interfaces, networks, devices, traffic and users without authentication is no longer an option. Misjudging and misplacing your trust in a malicious entity can lead […]
Read More… from Why Your Organization Needs Zero Trust Security