CyberSecurity Emergency Communication – Immediate Action Recommended

Cyber Security Blog Image

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

WINDOWS SERVER VULNERABILITY – NOTICE

Late last week it was reported that a particularly potent, “wormable” vulnerability exists within Windows Server. This affects all Windows Server versions that have DNS enabled.

It is essential that organizations protect their infrastructure.

In fact, the vulnerability is so widespread due to the prevalence of Windows Server’s that the US CISA – CyberSecurity & Infrastructure Security Agency issued for only the third time an Emergency Directive to all federal agencies and an urgent call to all organizations running the Microsoft Windows Server with activated DNS.

Microsoft has issued a July 2020 Security patch.

If you have not applied the patch or need assistance to ensure your organization is properly protected, please don’t hesitate to call GBS at 859.491.5900

Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

A Credential Harvesting Attack – How it was Detected & Stopped

As a proud Barracuda partner, GBS has adapted the original post, “Anatomy of a Sentinel Catch”, authored by Thorsten Stoeterau, Field Systems Engineer.

Within this post, Thorsten dissects a classic credential harvesting attack. He shows how an attack works, why it is so important to understand their anatomy, and how Barracuda Sentinel worked to detect and stop the attack. Sentinel is one of the key email protection solutions that is part of Barracuda’s Total Email Protection bundle.

Do You Want To Boost Your Business?

drop us a line and keep in touch

GBS Blog Footer Image

let's talk!

GBS Techknowledge Base Logo

Sign up for our Newsletter

Relevant | Timely | IT-based Business Technology Information

Techknowledge Base Subscription