A new zero-day flaw has been identified within the Microsoft Office suite. On May 30, 2022, security researchers identified a new zero-day flaw in Microsoft Office that could be used to run arbitrary code execution (ACE) on Windows systems. Dubbed “Follina” because the zero-day code references 0438 – the area code of Follina in Italy …
BK Business Solutions is pleased to announce a new service product that allows us to detect, defend, and respond to cyberattacks. Managed Detection and Response (MDR) enables your organization to address the dynamic, and increasingly sophisticated, nature of cybersecurity. This managed security service combines advanced threat detection technologies, finely tuned processes for monitoring those, and …
If your website has a checkout page, this information is important to your business! We are all familiar with credit card skimmers on gas station pumps. Now, there is another way for criminals to steal your customers’ credit card information – though a malicious malware script infection on your web site. Sucuri, a managed security …
If you have ever had your email hacked, then it is time to up your game against the fight with hackers. Here are a couple of things you can do to help secure your e-mail accounts. 1. Change your email account password. Make your password as strong as possible. Never use the …
At a worth of over $900 billion, Apple has captured the attention of many. It ranks at the top of many large American companies (Fortune), number 9 in the world (Forbes).
Their reputation precedes them. But like many other companies, Apple has fallen victim to scams. Even though their reputation is incredibly secure and resistant to viruses(iDrop), they can still be vulnerable to common scams that can access your private information, such as login credentials or even financial information.
In an article written by iDrop News, here are the 11 Most Common and Dangerous Apple Scams in Circulation:
ZENIS: A mischievous boy who loves cryptography, hardware and programming.
ZENIS is the newest ransomware attack to threaten your backup files. According to an article written by Lawrence Abrams on bleepingcomputer.com, ZENIS will encrypt your files, but then delete them, even if the ransom was paid.
You’ve heard it in the news recently. On December 14, the Federal Communications Commission voted to eliminate ‘Net Neutrality’.
What is ‘Net Neutrality’? The official definition, according to Wiki, is “the principle that internet providers must treat all data on the internet the same, and not discriminate or charge differently by user, content, website, platform, application, type of attached equipment, or method of communication.”
Did you know that ‘61% of data breach victims are businesses with fewer than 1,000 employees?’. According to dmdatabases.com, businesses with fewer than 1,000 employees account for over 99% of businesses in the United States!
A statement from SonicWall:
WPA2 KRACK Exploit: A SonicWall Alert
On October 16, 2017 security researchers made public earlier findings in which they demonstrated fundamental design flaws in WPA2 that could theoretically lead to man-in-the-middle (MITM) attacks using key reinstallation attacks (KRACKs). Exploiting the vulnerability could enable cyber criminals to steal confidential information such as email, credit card numbers, passwords and more.
Should I Upgrade to Windows 10? Microsoft released some exciting news that, as of July 29, Windows users are able to upgrade their operating system (OS) to Windows 10 for free (for Windows 7 & 8 users) when before OS upgrades had to be purchased. While Microsoft has released some new (and returned some old) …
1650 Manheim Pike, Suite 204, Lancaster, PA 17601
(717) 509-4410
INFORMATION TECHNOLOGY SERVICES