Blog    Customer Login
 Phone: 859-491-5900  



Blog

Microsoft Windows Vulnerability Notice & Citrix Vulnerability Notice Notice: Today, Microsoft is releasing a security patch – it is critically important to execute this patch! The security of your organization’s network may depend on it. According to KrebsonSecurity and multiple trustworthy industry sources, a vulnerability resides in a Windows component that handles “certificate and cryptographic messaging functions in the CryptoAPI.” The Microsoft CryptoAPI enables developers to secure Windows-based applications using cryptography, and includes functionality for
Infrastructure Security

September 26, 2019

Join GBS at comSpark 2019 – Oct. 8

Alex Perkins Comments are off
Join GBS at comSpark – if you haven’t already – register today! comSpark is this region’s premier conference on all-things IT, all-things technology. Stay tuned for more information on when you can see GBS presentations on CyberSecurity, The C-Suite Summit and a Break-out Session on the role Video Analytics plays in Data Security. Stay tuned for more details!
IT Solutions   ,
The following legacy OS versions (Windows 7 / XP / XP Pro / XP Embedded and Windows Server 2008 / 2003) are susceptible to CVE-2019-0708, a critical Remote Code Execution vulnerability.  Given the potential impact to customers and their businesses, Microsoft has made the security updates available for platforms that are no longer offered mainstream support. View MS Patch Despite the patches being made available by Microsoft, GBS recommends moving away from any operating system that is
Infrastructure Security, Uncategorized
WATCH THREAT CORRELATION VIDEO One of the key components of detecting and preventing a cyber attack is the ability to correlate network and endpoint security events. The ability to see and correlate security-related events gives administrators the visibility they need to stop unknown and evasive threats before the damage is done. Additionally, the ability to correlate events prevents successful attacks from spreading to other computers and other departments. Correlation allows administrators to: 1. Correlate network and endpoint
Infrastructure Security, Uncategorized
Does this scenario sound familiar – You have a high-profile presentation to internal stakeholders, you’ve developed PowerPoint slides and it’s 5 minutes before the meeting. You’ve triple checked your presentation and you’re ready to roll. You get to the conference room and the HDMI cable that was once hanging there is gone. In an instant your disposition goes from, “I’m ready to kick-butt – to – oh no I’m going to look like a fool.
A/V Solutions