Planned maintenance is performed every weekend for managed clients Saturday, 7am to 1pm
Fri, 28 Sep 2018 18:54:13 -0700
Linux Vulnerability; Log into most any Linux system by hitting backspace 28 times
Mon, 21 Dec 2015 12:15:35 -0700
Follow us on Twitter
Tue, 23 Apr 2013 10:13:01 -0700
vCenter Server 4.0.x web services may fail after installation of Microsoft Security Advisory update
Wed, 07 Nov 2012 13:28:21 -0700
Carl Ingram, Chief Information Officer of Vigilant Technologies warns, “It’s not a matter of ‘if’ but ‘when’ a small- or medium-sized business’ data will be breached with employees working remotely from home... Most businesses of less than 200 employees are particularly at risk,” Ingram said. “A vast number don’t have redundancy and cybersecurity in place to protect against external data breaches or internal employee errors that could result in catastrophic data loss.”
Vigilant’s remote shared data networks actually reduce data vulnerability to just 10% of internal office systems.
Contact us today and we will help you ensure your data stays secure, even with remote work.
Amazon, Microsoft and IBM recently announced that they will not offer face recognition APIs in their cloud platforms, either to law enforcement or in general, pending regulation on its use. This partly reflects the current political moment in the USA, but more fundamentally comes from ongoing concerns about the reliability of machine learning based systems in what can be life-or-death situations. AI systems look for patterns in data. If you provide the wrong data, they'll find the wrong pattern. These systems are easy to break if you don't know what you're doing or have bad data. The catch is that this tech is now mostly a commodity, and widely deployed throughout China. Facial recognition technology has been controversial since the beginning and the conversion continues to evolve as the technology does.
One of the most common security support requests we receive from our Office 365 customers is for assistance with remediating an account compromise. The most common scenario is that a member of their organization became the victim of a phishing scam and the attacker obtained the password for their account. If you believe an account (or multiple accounts) have been compromised because you have seen suspicious behaviors like emails in the 'Sent Items' folder not sent by the account owner, mail forwarding rules added, credential changes, a high number of failed logins, profile changes, or email signature changes, etc. Vigilant is here to help!
Intel processors are facing another major security threat after researchers uncovered a new attack on hardware. The attack known as SGAxe breaches the security guarantees of Intel Software Guard eXtensions (SGX) services, which look to protect the inner workings of a system alongside vital data such as passwords and encryption keys.