Take these 6 things into consideration when using security keys for your business.
In today’s world of digital threats and cybersecurity risks, having strong authentication measures is essential to ensure the safety of sensitive data and information. One such authentication measure that has gained immense popularity in recent times is the zero-trust physical security key. A zero-trust physical security key is a small USB device that is used […]
Hyper-V 2019 Failover and Replication Tips
We recently performed a Hyper-V 2019 failover for a customer and wanted to share some insights. Non-clustered environment, simply 2x 2019 Hyper-V servers on the same domain, with one replicated VMs to the other. We had a few VM’s setup to replicate from Hypervisor-1 (HV-1) to Hypervisor-2 (HV-2) We had some maintenance to do on […]
DHCP Server showing 169.254.x.x address after Windows 2016 upgrade to Windows 2019
You can find this issue on many other sites, but this just happened to us when upgrading a domain controller from 2016 to 2019, that also had the DHCP server role installed. First before upgrading, we demoted the DC to a regular domain server. Then we upgraded to 2019, and re-promoted the machine to a […]
Fixing stuck/hung dot net (.net) 3.5 install in Server 2016
In case you happen to run into this issue, we were attempting to install .net 3.5 for an application in Windows 2016 that required it. So we ran the following command to install it: DISM /Online /Enable-Feature /FeatureName:NetFx3 /All It started out OK but then it got stuck for over 4 hours sitting at 49.4%. […]
Hackers to Cloud Accounts of Technology and Aviation Companies Demonstrate Different Threat Model – the Parasite
Hackers to Cloud Accounts of Technology and Aviation Companies Demonstrate Different Threat Model – the Parasite Wake up C-suite! SC media writer Bradley Barth reported in January on instances where hackers were able to hijack cloud accounts of high-tech and aviation firms, and stay hidden. This type of advanced persistent threat has been plaguing companies […]
Using Route53 DNS private hosted zone server in OpenVPN
I was trying to get a private hosted zone to work an resolved server IP addresses with AWS when clients connected via OpenVPN. The Route53 private hosted zone worked within the servers in my environment, but not the OpenVPN clients. Per AWS’s own instructions (https://aws.amazon.com/premiumsupport/knowledge-center/r53-private-ubuntu/) I went down a rabbit’s hole of setting up a […]
DNS Vulnerability Affects Every Business with Windows Server: Don’t Wait for the Hack
The Department of Homeland Security (DHS) made an emergency mandate last month around Windows DNS vulnerabilities. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently identified a vulnerability in the Windows Domain Name System CVE-2020-1350. When the servers fail to properly handle requests, hackers can exploit this vulnerability by running arbitrary code in order to […]
Important note about logging into Office 365 with legacy software or devices
We wanted to share this important note make sure our clients are aware that they should be using modern email clients (ie. Outlook 2013 or newer), as well as smartphones that continuously update with either the latest iOS or Android operating systems – systems that will support “Modern Authentication.” The change will go into effect […]
Bad actors are using HTTPS
In alert issued by the FBI’s Internet Crime Complaint Center (IC3), scammers are now using fake websites with HTTPS certificates that appear to make the website secure in order to lure victims into providing payment or other sensitive information. Read the entire alert below: Source: https://www.ic3.gov/media/2019/190610.aspx CYBER ACTORS EXPLOIT ‘SECURE’ WEBSITES IN PHISHING CAMPAIGNS Websites […]
Is my Desktop Sharing Software secure?
ATTENTION! WARNING! Cyber Attackers are using Desktop Sharing Software to Target US Businesses Since 2018 until this year, there has been malicious attacks by cyber actors using desktop sharing software to facilitate numerous network invasions of authorized and unauthorized installations to gain access to a victim’s system and inaccessible files. Everyone, whether it is for […]