Catch IT

Recent Breach Targets Network Devices, Exposes Potential Vulnerability

There is a new hack in town that involves compromising large numbers of routers, switches, and other network devices belonging to governments, businesses, and critical-infrastructure providers. The Russian government-sponsored actors are using the compromised devices to perform man-in-the-middle attacks that extract passwords, intellectual property, and other sensitive information, and to [...]

By |2018-05-23T13:46:05-05:00May 23rd, 2018|Categories: Advisory, Catch IT, CyberSecurity|

The Rising Cost of Healthcare Data Breaches

Virtua Medical Group of South Jersey recently agreed to pay almost $418,000 as part of a settlement involving a breach of more than 1,600 medical patient files.  These patient records became viewable online due to a server misconfiguration by a 3rd party vendor. As a heavily regulated industry, healthcare data [...]

By |2019-02-07T10:04:05-05:00April 18th, 2018|Categories: Advisory, CyberSecurity|Tags: |

Is Your Website Secure?

Effective July 2018, Google's Chrome Browser Will Mark Any HTTP Website As Not Secure Google announced that any site that has not migrated to HTTPS by July will be flagged as NOT SECURE, even if your site does not collect any visitor information such as, emails or credit cards. As [...]

By |2018-04-16T12:40:09-05:00April 16th, 2018|Categories: Advisory, Catch IT|

Microsoft Remote Access Protocol Flaw Affects All Versions of Windows

A serious vulnerability found in Microsoft's Credential Security Support Provider protocol (CredSSP) could allow a hacker to gain control of a domain server and other systems in the network. CredSSP protocol has been designed to be used by RDP (Remote Desktop Protocol) and Windows Remote Management (WinRM) that takes care [...]

By |2018-03-14T15:29:11-05:00March 14th, 2018|Categories: Advisory, Catch IT, CyberSecurity|

Vulnerability Found in Lenovo’s Fingerprint Scanner, Update Required

A security flaw was recently identified in Fingerprint Manager Pro, an application developed by Lenovo that allows users to log into Windows machines and online websites by scanning one of their fingerprints using the fingerprint scanner embedded in selected Lenovo products. Sensitive data stored by Lenovo Fingerprint Manager Pro, including [...]

By |2018-02-07T12:58:13-05:00January 31st, 2018|Categories: Catch IT, CyberSecurity|

Recent Security Flaws Detected in Computer Chips

THREAT: Two security flaws have been discovered that affect nearly all microprocessors, the digital brains of the world’s computers. Dubbed Meltdown and Spectre, these major security flaws found in microprocessors are causing havoc amongst tech giants.  Up against the clock, experts are working to create patches to fix this problem [...]

By |2018-01-11T16:44:34-05:00January 11th, 2018|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Microsoft Issues Update for Critical Flaw Found in Malware Protection Engine

Microsoft revealed a critical vulnerability in its Malware Protection Engine (MPE) on Thursday (12/7) that allows an attacker to take full control of a target’s computer. Enabled by default, Microsoft Malware Protection provides the core cybersecurity capabilities for Microsoft anti-virus and anti-spyware programs in all of the company’s products. The vulnerability is [...]

By |2018-01-02T11:31:25-05:00December 8th, 2017|Categories: BMT Announcement, Catch IT, CyberSecurity|Tags: , |

Using Wi-Fi? KRACK Kills Your Privacy

THREAT: A new flaw has compromised the most widely used Wi-Fi Protocol (WPA2), allowing hackers to decrypt and view everything you are doing online. The exploit is called KRACK, short for Key Reinstallation Attacks.  This breach can be used to steal sensitive information such as credit card numbers, passwords, chat messages, [...]

By |2019-07-31T13:26:14-05:00October 16th, 2017|Categories: Catch IT, CyberSecurity|Tags: , , |

Look out Phishing, here comes Smishing!

Look out Phishing, here comes Smishing! There’s a new scam in town!  Although the name may sound funny, becoming a victim is not joke.  “Smishing” is an identity theft scheme that involves sending consumers text messages containing a link to a fraudulent website or phone number in an attempt to [...]

By |2018-01-02T11:43:14-05:00July 19th, 2017|Categories: Catch IT, CyberSecurity|

Cybersecurity Protocols and the Way We Do Business

The challenges of cybersecurity are changing the business landscape. As the risks associated with a data breach continue to rise, businesses are taking a closer look at their existing protocols and implementing formal risk assessments, policies and standards. Proactive companies not only audit themselves, but also look at vendors [...]

By |2019-07-31T13:08:48-05:00June 12th, 2017|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |
Go to Top