Services We Provide
Remote work - Enabling secure access outside of your company. With the recent shift to more and more employees working out of office, the requirement for remote access has gone up.Read More
Ransomware - The largest threat to your company Years ago when you got a virus on your computer it would show you popups on webpages or damage windows so that it would not work properly.Read More
Complete or partial IT management of small to medium businesses Every small to medium business has the same IT requirements as large companies with fulltime IT staff, but without the budget.Read More
Some of the
Platforms we trust
These are some of the platforms we recommend and support. From office productivity to network security, we work with trusted industry products to insure that your business processes are secure and reliable.
Microsoft is developing a patch for two actively exploited zero-day vulnerabilities in Microsoft Exchange Server. The flaws, tracked as CVE-2022-41040 and CVE-2022-41082, were discovered in Microsoft's enterprise mail server by Vietnamese cybersecurity firm GTSC. Microsoft said it is aware of “a small number of targeted attacks” exploiting the flaws, which impact on-prem Microsoft Exchange Server versions 2013, 2016, and 2019.
CVE-2022-41040 and CVE-2022-41082
Vulnerabilities in a third-party module within the firmware of NETGEAR routers and Orbi WiFi Systems could lead to arbitrary code execution on affected devices. Now patched, the high severity flaws included an unauthenticated command injection flaw (CVE-2022-40619), and an insecure auto-update mechanism (CVE-2022-40620) that enabled manipulator-in-the-middle (MitM) attacks, potentially leading to remote code execution (RCE).
CVE-2022-40619 and CVE-2022-40620
BackupBuddy, which is used to backup WordPress sites, and has around 140,000 active installations. WordPress security firm Wordfence has revealed that its firewall has blocked more than 4.9 million exploit attempts related to the flaw since abuse was first detected on August 26. The issue - tracked as CVE-2022-31474 with a CVSS score of 7.5 - enables unauthenticated attackers to download sensitive files from vulnerable sites.