iManage Security Vulnerability due to third-party Apache component Log4j

If not mitigated, potential remote exploits to an Apache component called Log4J can be executed by a malicious attacker. This vulnerability is known worldwide as CVE-2021-44228.

iManage Security Vulnerability due to third-party Apache component Log4j2021-12-14T14:49:19-05:00

Alert: Third-party Security Vulnerability Affects On-Premises versions of iManage Systems (Apache)

The iManage Security team identified a vulnerability affecting on-premises versions of iManage products. It is an exploit targeting the Apache HTTP Server which if not mitigated, can be exploited under certain conditions.

Alert: Third-party Security Vulnerability Affects On-Premises versions of iManage Systems (Apache)2021-11-19T08:25:03-05:00

Prosperoware and Cornerstone.IT Streamline Cloud Migration and Bolster IT Infrastructures in New Partnership

Prosperoware and Cornerstone.IT Streamline Cloud Migration and Bolster IT Infrastructures in New Partnership Keeping IT Efficient, Productive, Agile, and more Secure PHILADELPHIA, PA – November 17, 2021, Prosperoware, an enterprise software company for adoption and governance of collaboration systems, announces new partnership with Cornerstone.IT, a leading full-service information technology company, that will empower organizations making the transition to cloud-based services. Cornerstone.IT is a full-service IT Business Solutions and Managed Services Provider with offices across the [...]

Prosperoware and Cornerstone.IT Streamline Cloud Migration and Bolster IT Infrastructures in New Partnership2021-11-17T12:16:34-05:00

Alert: Multiple Vulnerabilities in VMware vCenter Server

Alert: Multiple Vulnerabilities in VMware vCenter Server What is being impacted? Multiple vulnerabilities in VMware vCenter Server have been reported to VMware, affecting vCenter Server and Cloud Foundation. What’s the issue? There is an arbitrary file upload vulnerability in the Analytics service. What happens if I do not address this? Specially crafted files can be uploaded by malicious actors with network access to port 443 to execute code. What should I do? Learn more here [...]

Alert: Multiple Vulnerabilities in VMware vCenter Server2021-09-21T14:32:56-04:00

Cornerstone.IT Now Available in the Microsoft Azure Marketplace

Microsoft Azure customers worldwide now gain access to Cornerstone.IT Remote Desktop Pro to take advantage of the scalability, reliability, and agility of Azure to drive application development and shape business strategies.

Cornerstone.IT Now Available in the Microsoft Azure Marketplace2021-07-12T14:31:00-04:00

Cornerstone.IT Now NIST 800 171 Compliant

New York, NY, June 24, 2021 – Cornerstone.IT has taken security to the next level by adopting the National Institute of Standards and Technology (NIST) controls typically used for government agencies and Department of Defense contractors.

Cornerstone.IT Now NIST 800 171 Compliant2021-07-27T12:25:31-04:00

Product Security Alert: Microsoft On-Premises Exchange Servers / Google Chrome and Edge Browsers / Cisco

Three new Product alerts for Microsoft On-Premise Exchange Servers / Google Chrome and Edge Browsers / Cisco - read now.

Product Security Alert: Microsoft On-Premises Exchange Servers / Google Chrome and Edge Browsers / Cisco2021-04-29T19:20:07-04:00

[Update] On-Premises Microsoft Exchange Server Zero-Day Vulnerability

Microsoft has released a patch to mitigate to this vulnerability, we can’t deny the fact that this security flaw has already been exploited by numerous criminal organization – developing into a new ransomware attack and other potential malicious activities. Check this post for options & solutions.

[Update] On-Premises Microsoft Exchange Server Zero-Day Vulnerability2021-03-16T13:33:35-04:00

Advisory: IE/Microsoft Edge (Legacy) Memory Corruption Vulnerability

Advisory: IE/Microsoft Edge (Legacy) Memory Corruption Vulnerability by Keeshia Leopoldo, InfoSec Team Lead Connect with us at www.Cornerstone.IT/contact for the latest updates. Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have.  #ITCornerView Issue/Vulnerability Internet Explorer/Microsoft Edge (Legacy) Memory Corruption Vulnerability [CVE-2021-26411, CVE-2021-27085] Scope In February, South Korean cybersecurity firm Enki disclosed that threat actors used an Internet Explorer zero-day vulnerability in attacks to install custom [...]

Advisory: IE/Microsoft Edge (Legacy) Memory Corruption Vulnerability2021-03-16T11:14:54-04:00

Business Continuity & the COVID-19 Challenge

COVID-19 has affected all aspects of our lives. Social distancing is proving to be an effective weapon against this pandemic. Keeping a sense of normalcy amongst all the tragic news is paramount. Technology allows us to retain some sense of normalcy from allowing communication with friends and family around the world to keeping our businesses productive. Cornerstone’s business continuity plan is built into our day-to-day operations.  All of our systems and software are hosted by [...]

Business Continuity & the COVID-19 Challenge2020-04-06T15:09:24-04:00