Technology Infrastructure
-
Change Your Password If You Use The ParkMobile Parking App – Your Information May Be Compromised
The data for approximately 21 million customers who use the ParkMobile parking app has been compromised. If you use this app some of the potential information that is being sold right now includes your mailing address, license plate number, email address, passwords and phone numbers.
-
Does Your Business Continuity & Disaster Recovery Plan Protect You In The Current Pandemic Environment?
With the pandemic we have seen an increase in inquiry to assist with the development or review of business continuity plans (BCP) and Disaster Recovery plans (DRP). Business continuity focuses on your process for recovering critical functions, while disaster recovery is more narrow in focus and most times is a subset of your BCP.
-
CLA Cybersecurity Alert: Microsoft Email Server Attack Update
On March 2, Microsoft first announced a series of vulnerabilities that enabled hackers to break into the company’s Exchange email, calendar programs, and in some cases integrated voice messaging. China — among others — has allegedly used this vulnerability to spy on a wide range of industries in the United States ranging from medical research to law firms to defense contractors.
-
Critical Vulnerabilities Found on Exchange Server 2019, 2016, and 2013
Microsoft released several security updates for Microsoft Exchange Server to address vulnerabilities that have already been used in limited targeted attacks. Due to the critical nature of these vulnerabilities, it is recommended that customers apply the updates to affected systems immediately to protect against these exploits and to prevent future abuse across the ecosystem.
-
Thoughts on SolarWinds Incident for FedGov
The Information Technology community is in the midst of one of the most far-reaching cybersecurity failures in history. The supply chain for SolarWinds updates provided an opportunity for attackers to gain entrance into a broad customer base without directly attacking fortified defenses. The next steps for potential victims include recognition of the breach, remediation of the affected network assets, and recovery. Recovery would be achieved to a level of assurance for confidence, integrity, and availability of an organization’s data and operations.
-
Increase in Cyber Attacks on K-12 Schools in Remote Environment
K-12 schools continues to be a target for cyber attacks. Cybersecurity & Infrastructure Security Agency (CISA) shared an alert regarding the increase in attack due to the remote work environment and some mitigations to reduce your risk.
-
SolarWinds Orion Vulnerability
SolarWinds, a popular software company used by organizations big and small, was the target of an advanced cyber attack that allowed fraudsters to implant a backdoor in one of their popular software products.
-
To Pay or Not Pay the Ransom
There has been an increase in ransomware demands since COVID and this sometimes encourage future ransomware payment demands. This could result in sanctions.