Managed Services

Application Ring-Fencing and Storage Control

In our previous edition of this newsletter, we had discussed how ZTNA (Zero Trust Network Access) can be used to whitelist applications so that your organization can have control over what applications are allowed to run on computers inside your network, thereby eliminating the threat of accidentally downloaded utilities with malicious software from causing havoc.In this edition,…

Read more
Cybersecurity

Japan – Tokyo 2020 Olympics

Just as the games were kicking off, officials disclosed that the usernames and passwords of Tokyo 2020 Olympic Games ticket holders and event volunteers were leaked online. The stolen credentials could be used to log on to websites for volunteers and ticket holders, compromising personal data such as names, addresses and bank account numbers. Officials…

Read more
Cybersecurity

United States – Electronics Arts (EA)

Hackers have leaked an estimated 751GB of compressed EA data containing FIFA 21 source code on a dark web forum. Initially, they released a cache of 1.3GB of FIFA source code on July 14 as part of a demand for payment to stop them from releasing the rest, but after EA refused to play ball,…

Read more
Cybersecurity

United States – Republican National Committee (RNC)

Russian-aligned nation-state cybercriminals hacked into the Republican National Committee last week. Initially dismissive of the hack, RNC officials ultimately admitted that their security had been breached. However, those officials attributed the hack to a data security incident at a subcontractor, Synnex. The RNC announced that they are working with experts at Microsoft to investigate this…

Read more
Managed Services

Zero-Trust Network Access

As users continue to work from anywhere and IoT devices flood networks and operational environments, continuous verification of all users and devices as they access corporate applications and data is needed. To protect networks and applications, network administrators must apply a Zero-Trust Access approach and provide least access privileges. Implementing zero-trust access includes requiring strong authentication capabilities, powerful…

Read more
Cybersecurity

United States – Mercedes Benz USA

Mercedes-Benz USA has disclosed a data breach impacting some of its US customers. The data breach exposed PII of under 1,000 Mercedes-Benz customers and potential buyers. This breach was announced after a Mercedes-Benz vendor informed the company that the personal information of select customers was exposed due to an insufficiently secured cloud storage instance. Here’s…

Read more
Cybersecurity

United States – Intuit

Accounting software giant Intuit has notified customers that they have suffered a breach. The company warned users of TurboTax that their personal and financial information was accessed by attackers following what looks like a series of account takeover attacks. Intuit announced that the threat actors used credentials (usernames and passwords) obtained from “a non-Intuit source”…

Read more
Cybersecurity

United States – CVS

CVS is in hot water after researchers discovered a trove of over one billion records online that were connected to the US healthcare and pharmaceutical giant. The unsecured database was estimated to be 204GB in size. According to reports, the databases contained an astonishing assortment of sensitive data like event and configuration data, visitor IDs,…

Read more
Software Development

Microsoft Power Suite of Tools

In the fast changing world of software programming and business intelligence, Microsoft has been the leader for three (3) decades now. It’s Visual Studio platform for developing software first in C, then C++, and now C# and support for many other languages and scripts continues to remain extremely popular among programmers. It’s SSRS (SQL Server Reporting Service)…

Read more