Your Not HIPAA Compliant Using Windows Server 2008

If your using Windows Server 2008 or older on your network it makes you none HIPAA Compliant and should be ashamed for putting your clients and patient information at risk.

What Windows Server 2008 “END OF LIFE” and HIPAA mean for you?

What you need to worry about is that Windows Server 2008 will no longer receive windows security updates for vulnerabilities and this in itself is a breach in HIPAA compliance. This also means that Microsoft will no longer offer technical support for any issues, software updates, and security updates or fixes.

One of the main reasons why Your Not HIPAA Compliant Using Windows Server 2008 is because of the lack of security updates and fixes. This puts all information stored on Windows Server 2008, including confidential client information, will be at risk. Hackers and external security threats will know about this stop date, and as such will … Read the rest

Your Not HIPAA Compliant Using Windows 7

If your using Windows 7 or older on your network you are not HIPAA Compliant and should be ashamed for putting your clients and patient information at risk.

What WINDOWS 7 “END OF LIFE” and HIPAA mean for you?

What you need to worry about is that Windows 7 will no longer receive windows security updates for vulnerabilities and this in itself is a breach in HIPAA compliance. This also means that Microsoft will no longer offer technical support for any issues, software updates, and security updates or fixes.

One of the main reasons why Your Not HIPAA Compliant Using Windows 7 is because of the lack of security updates and fixes. This puts all information stored on Windows 7, including confidential client information, will be at risk. Hackers and external security threats will know about this stop date, and as such will find it easier to push through … Read the rest

Mozilla patches zero-day flaw in Firefox

Mozilla the makers of Firefox has issued a zero-day security update for Firefox and Firefox Extended Support Release, which were found to contain an actively exploited flaw in the IonMonkey JIT compiler.

What is known

“Incorrect alias information in IonMonkey JIT compiler for setting array elements could lead to a type confusion,” they stated in the official advisory posted by Mozilla, citing the two elements as StoreElementHole and FallibleStoreElmenet. “We are aware of targeted attacks in the wild abusing this flaw.”

Announced January 8, 2020
Impact: critical
Products: Firefox, Firefox ESRFixed in

  • Firefox 72.0.1
  • Firefox ESR 68.4.1

 

Designated CVE-2019-17026, the zero-day bug was reported by researchers at Qihoo 360 ATA. The problem has been fixed with the latest release of Firefox 72.0.1 and Firefox ESR 68.4.1

No other details have been provided by firefox. Click here to Download Latest Firefox Software to patch the zero-day flaw.

Read the rest

Zynga.com maker of Words with Friends data is on the Dark Web

Zynga.com, maker of Words with Friends suffered a data breach in December that included 228m records and that data has recently surfaced on the Dark Web.

In the past you may have signed up for Words with Friends and other zynga.com created games and provided the information to a service that is in some way associated with zynga.com. It may be difficult for you to remember, or you simply may not know other services are associated with zynga.com. What is important to know is that information belonging to all these users are now being shared improperly on the dark web.

Even though you may have stopped using zynga.com (games Words with Friends and Draw Something), or perhaps deactivated the account, or maybe unsubscribed, the information could still be available in their systems.

Exposed Information

  • Email
  • Username
  • Password
  • Facebook Username/ID

What can you do next?

Being proactive with best practices and … Read the rest

Android Phones Vulnerable Due To Pulse Secure VPN

Hackers are exploiting existing vulnerabilities in Pulse Secure VPN and Android Phones. The flaw tracked as CVE-2019-1150, has been rated ‘Highly’ critical. This arbitrary read file vulnerability affects multiple versions of Pulse Connect Secure and Pulse Policy Secure. This flaw allows remote attackers to connect via HTTPS to an enterprise network without the requirement of any valid username or password.

Attackers can use the flaw to view logs and files, turn-off multifactor authentication, download arbitrary files and execute malicious code on enterprise networks.

Good News is Pulse Secure has released a security update to address the issue and users are urged to apply the patches immediately to mitigate such attacks.

Read the rest

Your NETFLIX Membership Has Expired Phishing Email

Did you know that your Netflix Membership has expired on Dec 31st 2019? Hackers are using these types of Phishing emails to try and gain access to your account to obtain private information and maybe watch some NETFLIX on your dime.

Some common tip-offs that an email is phony are typos, grammatical mistakes, awkward language, missing words, extra spaces, and other signs that the email was written unprofessionally. Such emails might also ask you to look at an attachment or click a link and then give your personal information on a Web page or in a form. Or the sender’s email address might look suspicious. If you hover over the links you can even see that it would not direct you to legit URL. Here Are A Few Email TIPS 

Read the rest

WordPress 5.3.1 patches four security vulnerabilities

WordPress has pushed out version 5.3.1 patching four security issues.

WordPress versions 5.3 and earlier contain a few vulnerabilities and the WordPress is recommending users that utilize WordPress to download the the latest version. This is a short-cycle maintenance release and soon will be superseded by a full update when version 5.4 is released.

WordPress did not make note of any CVEs, but they did say in a PUBLIC MESSAGE that the vulnerabilities included contained an issue where a unprivileged user could make a post sticky via the REST API; an problem where cross-site scripting (XSS) could be stored in well-crafted links; a stored XSS vulnerability using block editor content and the fix also hardens wp_kses_bad_protocol() to ensure that it is aware of the named colon attribute.

Read the rest
Dell Network Tutorials

Update Firmware On Dell N2024 Switches

These are a few steps on how to Update Firmware On Dell N2024 Switches

  1. Before making any configurations, we will want to make sure that the switches have latest firmware.
  2. Grab the Switch Service Tag and go to the dell website and download the latest firmware.
  3. Since the creation of this article the latest firmware for my Dell N2024 is N2100v6.6.0.13.A03
  4. We will need a USB Thumb Drive and extract the firmware N2000Stdv6.6.0.13.stk and place it into the root of the USB Drive.
  5. We will be updating the switches individually plug in your usb drive to the front of the switch.
  6. Plug in your console cable from the switch to your computer.
  7. Plug in the power cable just to the one switch and it should start booting up
  8. Use Putty to get connected to COM3 through whatever COM number.
  9. Once you see the following we are ready to throw some
Read the rest
Dell Network Tutorials

Restore Dell N2024 or N2048 Switch to factory defaults

To restore the Dell N2024 or N2048 switch to factory defaults you can follow the below procedure:

  1. Manually reboot your switch
  2. While the switch is booting up keep an eye on the bootup screen and find “Dell Networking Boot Options” and select option #2 (Display Boot Menu) within 3 seconds.
  3. On Boot Main Menu, enter choice # 10 for enable password removal.

Dell Networking Boot Options

Select a menu option within 3 seconds or the Operational Code will start automatically…

1 – Start Operational Code

2 – Display Boot Menu

Select Cl , 2) # 2

Boot Main Menu

1 – Start Operational Code
2 – Select Baud Rate
3 – Retrieve Logs
4 – Load New Operational Code
5 – Display Operational Code Details
9 – Reboot
10 – Restore Configuration to Factory Defaults
11 – Activate Backup Image
12 – Start Password Recovery
Enter Read the rest

PowerShell Tutorials

How to Re-Establish Domain Relationship trust using PowerShell

If you are looking for a how to on an easy way to Re-Establish Domain Relationship trust using PowerShell you have come to the right place.

Introduction

In today’s digital age, establishing and maintaining domain relationship trust is crucial for the smooth functioning of various network operations. With the help of PowerShell, a powerful scripting language and automation framework developed by Microsoft, administrators can efficiently manage and restore domain relationship trust. This article will guide you through the process of re-establishing domain relationship trust using PowerShell, providing you with step-by-step instructions and valuable insights.

Why is Domain Relationship Trust Important?

Domain relationship trust forms the foundation of secure and reliable network communication. It allows different domains within a network to establish a trusted connection and share resources seamlessly. When the trust relationship between domains is compromised or broken, it can lead to authentication issues, limited access to shared resources, and … Read the rest

Stay Informed

Receive instant notifications when new content is released.