Keeping Legacy Software Safe

Keeping Legacy Software Safe

Keeping Legacy Software Safe The primary problem with legacy software is keeping it secure.  Many businesses are using software that was developed years ago and before many of these new attack variants were ever even considered.  That means that they were not designed...
No Security for Windows 7 After Today

No Security for Windows 7 After Today

No Security for Windows 7 After Today Are you using Windows 7?  Did you know some of the largest firms in the country (even large financial institutions) are still using it?  Today is the day that Microsoft ends support for Windows 7 and will no longer offer security...

Zero-Day Browser Vulnerabilities

Zero-Day Browser Vulnerabilities “This is a catastrophe,” my wife said—slightly horrified—as she swiped through page after page of apps on my phone. “Why do you even have most of these?” It’s a good question. It’s hard to believe that just a decade ago, the App Store...

Updates, Patches and Hackers Oh My!

Updates, Patches and Hackers Oh My! Most data breaches ard due to hackers exploiting known vulnerabilities. I know, I hear it all the time – patching takes time, and it can indeed be risky, especially if you have any legacy hardware or software in your network...

Hackers Preying on Old and Decrepit Technology

Hackers Preying on Old and Decrepit Technology 1042-02 Cybercriminals will innovate when necessary. However, more likely, like any successful enterprise, they will harvest any low-hanging fruit when and wherever they can find it. For those of us with unpatched older...