logo1

Take these 6 things into consideration when using security keys for your business.

In today’s world of digital threats and cybersecurity risks, having strong authentication measures is essential to ensure the safety of sensitive data and information. One such authentication measure that has gained immense popularity in recent times is the zero-trust physical security key. A zero-trust physical security key is a small USB device that is used […]

Hyper-V 2019 Failover and Replication Tips

We recently performed a Hyper-V 2019 failover for a customer and wanted to share some insights. Non-clustered environment, simply 2x 2019 Hyper-V servers on the same domain, with one replicated VMs to the other. We had a few VM’s setup to replicate from Hypervisor-1 (HV-1) to Hypervisor-2 (HV-2) We had some maintenance to do on […]

Fixing stuck/hung dot net (.net) 3.5 install in Server 2016

In case you happen to run into this issue, we were attempting to install .net 3.5 for an application in Windows 2016 that required it. So we ran the following command to install it: DISM /Online /Enable-Feature /FeatureName:NetFx3 /All It started out OK but then it got stuck for over 4 hours sitting at 49.4%. […]

Using Route53 DNS private hosted zone server in OpenVPN

I was trying to get a private hosted zone to work an resolved server IP addresses with AWS when clients connected via OpenVPN. The Route53 private hosted zone worked within the servers in my environment, but not the OpenVPN clients. Per AWS’s own instructions (https://aws.amazon.com/premiumsupport/knowledge-center/r53-private-ubuntu/) I went down a rabbit’s hole of setting up a […]

DNS Vulnerability Affects Every Business with Windows Server: Don’t Wait for the Hack

The Department of Homeland Security (DHS) made an emergency mandate last month around Windows DNS vulnerabilities.  The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently identified a vulnerability in the Windows Domain Name System CVE-2020-1350. When the servers fail to properly handle requests, hackers can exploit this vulnerability by running arbitrary code in order to […]

Important note about logging into Office 365 with legacy software or devices

We wanted to share this important note make sure our clients are aware that they should be using modern email clients (ie. Outlook 2013 or newer), as well as smartphones that continuously update with either the latest iOS or Android operating systems – systems that will support “Modern Authentication.” The change will go into effect […]

Bad actors are using HTTPS

In alert issued by the FBI’s Internet Crime Complaint Center (IC3), scammers are now using fake websites with HTTPS certificates that appear to make the website secure in order to lure victims into providing payment or other sensitive information. Read the entire alert below: Source: https://www.ic3.gov/media/2019/190610.aspx CYBER ACTORS EXPLOIT ‘SECURE’ WEBSITES IN PHISHING CAMPAIGNS Websites […]

Is my Desktop Sharing Software secure?

ATTENTION! WARNING! Cyber Attackers are using Desktop Sharing Software to Target US Businesses Since 2018 until this year, there has been malicious attacks by cyber actors using desktop sharing software to facilitate numerous network invasions of authorized and unauthorized installations to gain access to a victim’s system and inaccessible files. Everyone, whether it is for […]

Skip to content