Recently, Ironcore was notified about undisclosed Microsoft Exchange on-premises servers being exploited by zero-day vulnerabilities.
Recently, Ironcore was notified about undisclosed Microsoft Exchange on-premises servers being exploited by zero-day vulnerabilities.
Our data is collected daily. With security breaches as a common threat, it is important to take precautions in order to keep our data safe, but what about our children’s data? We commonly think of data collection as something that only happens on screened devices while interacting with websites. Your child might not have perused Black Friday sales online, but is there something else that may be collecting their data?
Topics: Security, Internet of Things, Smart Toys, IOT
The security threat landscape continues to evolve as more companies transition from self-hosted e-mail and collaboration services to cloud-hosted services, such as Microsoft’s M365. Due to its relatively low risk and high reward potential, malicious actors have shifted their focus to compromising users of cloud services.
Topics: MFA, Conditional Access, M365, Multi-Factor Authentication, Microsoft, Microsoft 365, cybersecurity
(Springfield, IL) July 15, 2020 – Today, Community BancService Corporation, Inc. (CBSC), the business services subsidiary of the Community Bankers Association of Illinois (CBAI), announced it has endorsed Ironcore, Inc. as its exclusive Preferred Partner for Managed IT and Cybersecurity Services.
Topics: Cybersecurity Solutions, CBAI, Preferred Provider, Managed IT Services
Constant changes to the internet mean standards must be updated or created as needed. The primary organization responsible for forging internet standards is the Internet Engineering Task Force, IETF. Recently, IETF approved two new methods for encrypting DNS traffic to improve the privacy and security of DNS lookups. These are DNS over HTTPS or DoH and DNS over TLS or DoT.
Topics: DNS over HTTPS, DNS Filtering, Security, Encryption, DoH
Email has become one of the most critical applications for almost every business. It is also one of the most common ways that companies become infected with malware. If your business sends outgoing emails that contain sensitive content, including Social Security numbers, account numbers, credit card numbers, financial terms or other personal financial information. Then obtaining an email encryption service is necessary.
Topics: Email Encryption, Safety Tips
As Office 365 has become popular with businesses of all sizes, it has also become a popular attack vector for hackers and fraudsters. One of the ways that these internet miscreants have been attacking Office 365 customers is through mail processing rules.
Topics: Office 365
Summer Break is right around the corner for many kids. Which means they will be telling you they are bored in no time. Not this Summer parents! Keep their skills sharp over Summer break with these awesome STEM kits. All of these kits are available on Amazon.
Note: Prices of products could change, these were the prices when making this blog post. The links to buy are down below in the sources section.
Topics: Family Topics