iManage Security Vulnerability due to third-party Apache component Log4j

If not mitigated, potential remote exploits to an Apache component called Log4J can be executed by a malicious attacker. This vulnerability is known worldwide as CVE-2021-44228.

iManage Security Vulnerability due to third-party Apache component Log4j2021-12-14T14:49:19-05:00

Going Beyond Passwords

Passwordless Authentication simply means MFA without a password: authenticating with other methods other than a password, such as biometrics, one-off email, or phone verification. MFA is often thought of as a second factor -in addition to a password- typically tied to a phone and approved with a phone call, push, or temporary numerical code. But MFA is more than that.

Going Beyond Passwords2021-11-15T06:35:42-05:00

Security Alert: New Malware called “FoggyWeb” enables hackers to steal Admin Credentials

Alert: New Malware called “FoggyWeb” enables hackers to steal Admin Credentials Urgency/Severity: CRITICAL Issue / Vulnerability Digitaltrends.com summarizes the issue as follows: Microsoft has recently discovered another type of malware, named FoggyWeb by Microsoft, that hackers are currently using to remotely steal network admin credentials. The credentials allow the attacker group, which the company has called Nobelium, to hack into admin accounts of the Active Directory Federation Services’ (AD FS) servers and control users’ access [...]

Security Alert: New Malware called “FoggyWeb” enables hackers to steal Admin Credentials2021-09-30T14:00:40-04:00

Product Security Alert: Windows Print Spooler Remote Code Execution Vulnerability

Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have.  #ITCornerView Product Security Alert: Windows Print Spooler Remote Code Execution Vulnerability Urgency/Severity: CRITICAL Issue / Vulnerability Microsoft is aware of and investigating a remote code execution vulnerability that affects Windows Print Spooler and has assigned CVE-2021-34527 to this vulnerability. This is an evolving situation and we will update the CVE as more information is available. A [...]

Product Security Alert: Windows Print Spooler Remote Code Execution Vulnerability2021-07-06T10:00:28-04:00

Cornerstone.IT Now NIST 800 171 Compliant

New York, NY, June 24, 2021 – Cornerstone.IT has taken security to the next level by adopting the National Institute of Standards and Technology (NIST) controls typically used for government agencies and Department of Defense contractors.

Cornerstone.IT Now NIST 800 171 Compliant2021-07-27T12:25:31-04:00

Product Security Alert: Critical Citrix Vulnerability Allowing Malicious Attack

Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have.  #ITCornerView Product Security Alert: Critical Citrix Vulnerability Allowing Malicious Attack Urgency/Severity: HIGH Issue / Vulnerability Multiple vulnerabilities have been discovered in Citrix ADC (formerly known as NetScaler ADC), Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition appliance models 4000-WO, 4100-WO, 5000-WO, and 5100-WO.These vulnerabilities, if exploited, could result in the following security [...]

Product Security Alert: Critical Citrix Vulnerability Allowing Malicious Attack2021-06-15T12:59:42-04:00

Product Security Alert: Secure Your Dell Laptops and Desktops Now

Ask us how we can help secure your environment with the top 10-12 security enhancements every firm should have.  #ITCornerView Product Security Alert: Secure Your Dell Laptops and Desktops Now Issue/Vulnerability:Critical Vulnerability on Dell Laptops and Desktops running on Windows may lead to escalation of privileges, denial of service, or information disclosure Urgency/Severity: HIGH Scope A driver (dbutil_2_3.sys) packaged with Dell Client firmware update utility packages and software tools contains an insufficient access control vulnerability [...]

Product Security Alert: Secure Your Dell Laptops and Desktops Now2021-05-06T16:13:52-04:00

Advisory: HAFNIUM targeting Exchange Servers with 0-day Exploits

Hafnium operators deploy web shells on compromised server, creating software backdoors that allow attackers to steal data and perform additional malicious actions that lead to further compromise.

Advisory: HAFNIUM targeting Exchange Servers with 0-day Exploits2021-03-15T22:51:43-04:00

Microsoft Netlogon Vulnerability as of February 9, 2021

As of February 9, 2021, any Microsoft customer that has a supported version of Windows Server that is used as a Domain Controller in their environment will no longer allow legacy, unsupported Windows systems to talk to the supported Windows Server Domain Controller unless specific action takes place.

Microsoft Netlogon Vulnerability as of February 9, 20212021-02-03T13:39:48-05:00

The New NYS Cybersecurity & Privacy Law (SHIELD Act)

On February 11, 2020: Barton LLP, NYC hosted, “How Does the New NYS Cybersecurity & Privacy Law (SHIELD Act) Impact Your Business?”, an ILTA event presented by Jim Moreo of Cornerstone.IT & Kenneth N. Rashbaum of Barton LLP

The New NYS Cybersecurity & Privacy Law (SHIELD Act)2020-02-14T14:15:22-05:00