Re-blog: Exchange 2016 CU7 Bug Causes HCW to Fail

Posted by Terence Kolstad on Nov 18, 2017 10:04:00 AM

Original blog post by Zoltan Erszenyi

Read More

Topics: Insider, Education

Thoughts on the Direction of Microsoft and Security

Posted by Terence Kolstad on Nov 17, 2017 3:09:38 PM

I was fortunate enough to attend the Microsoft Ignite conference in Orlando, FL this year. During the conference, there was a TON of information to gather, experts to network with, and vendors to see in the Expo Hall.

Read More

Topics: Education, Cyber Security

Joe's Link: Missing out on Technology revolution could seriously change your life

Posted by Joe Moline on Nov 3, 2017 8:33:44 AM

I admit I am not someone who was not always on the cutting edge of technology.  It’s not that I don’t love technology and appreciate the many improvements it has made to my quality of life.  It’s just that I am not an early adapter type. I need to fully understand how and why each technology product is going to improve my life before I invest any of my own time or money.

Read More

Topics: Off Topic/Fun

Cyber Advisors chooses Dell EMC VxRail for Internal Digital Transformation

Posted by Dan Sanderson on Oct 23, 2017 11:29:29 AM

Minneapolis, MN – October 23rd, 2017 - As part of their commitment to Dell EMC, Cyber Advisors announced this week that they have chosen software defined Dell EMC VxRail and VMware as the Hyperconverged (HCI) solution of choice to host their own internal operations.

Read More

Topics: VxRail Hybrid Cloud Digitial Transformation

Joe's Links: Getting to know you're scammer and brews and bytes

Posted by Joe Moline on Oct 13, 2017 7:38:47 AM

I remember growing up and the old rotary phone ringing during dinner time and we’d frustratingly find out that it was telemarketers.  This was before caller ID or the ability to just silence the ringers.  We as kids were advised to try and determine if it was someone our parents actually knew, and then if not, to lie and say they weren’t home.  Wait, then the kidnappers would think we were home alone. We had to tell a better lie... For years telemarketers thought my parents took really long nightly showers.

Read More

Topics: Off Topic/Fun

How to Stop Cortana from Talking During Windows 10 1703 Image Deployment

Posted by Caleb Lund on Oct 11, 2017 10:05:00 AM

With each new release of Windows, we continue to find more features and functions that Microsoft has rolled into the new build. Some of them are very welcomed and some are a little misunderstood or mildly annoying.

Read More

Topics: Tech Article

In the Know - Cyber Security Update - Week of October 1st - October 8th

Posted by Eric Brown on Oct 8, 2017 9:10:41 PM

October is Cyber Security Awareness month, it’s likely that one of your email accounts has been involved in a breach - find out how to know for sure, let’s ditch Yahoo mail together, a new password stealer is in the wild, and another unsecured database is discovered, this time compromising NFL players and their agents private data.

Read More

Topics: Cyber Security

In the Know - Cyber Security Update - Week of September 24th - October 1st

Posted by Eric Brown on Oct 3, 2017 8:04:59 AM

Attackers turn their attention to foods this week, Wholefoods & Sonic compromised point of sale systems, cause fire sale of credit and debit card account numbers on the dark web, we learn how much Tinder knows about you, and it seems the Deloitte hack is going to be a lot worse than originally estimated.

For those in the Twin Cities:

We are having a Cyber Security Fall Forum at Utepils Brewery on October 17th, Craft beer, soda, food and an afternoon of Cyber Security!  Register here:

Read More

Topics: Cyber Security

In the Know - Cyber Security Update - Week of September 17th - September 24th

Posted by Eric Brown on Sep 24, 2017 7:03:17 PM

Pattern recognition easily defeats Android passwords, more Amazon S3 buckets exposed, GPS coordinates on an Instagram post lead to a Most Wanted Arrest, and WI-FI theft causes the FBI to raid the wrong home. 

We continue with our theme of improving our security posture by looking at some quick ways to keep our own personal WI-FI from being hacked.

For those in the Twin Cities:

We are having a Cyber Security Fall Forum at Utipils Brewery on October 17th, Craft beer, soda, food and an afternoon of Cyber Security!  Register here:

Read More

Topics: Cyber Security

In the Know - Cyber Security Update - Aftermath of Equifax Part 2

Posted by Eric Brown on Sep 18, 2017 1:23:16 PM

This week we learned:
1.    The Equifax breach was indeed the result of an unmitigated known security vulnerability in the Apache Struts 2 web application service discovered in March 2017 Apache Struts CVE-2017-5638.
2.    Security researchers exposed an additional database in Argentina protected with the credentials of admin/admin.  Equifax claims that this database had not been used since 2013 which leads one to question what other databases were left exposed to the internet with easily guessable passwords.  
3.    Two executives have “retired” and the CEO will be facing a congressional inquiry on October 3rd.

In last week’s article we focused on tackling the immediate steps to take charge of your own credit.  If you haven’t had a chance to freeze and review your credit and change your logins and passwords please consider doing so.  Keep track of all of your receipts and expenses related to the breach, as there will be opportunities to participate in a variety of lawsuits, especially if your identity was stolen as a result of Equifax’s negligence.  There’s also the opportunity to take a short position through put options or a straight short sale, if that interests you.  The stock has moved 50 points down in the last 2 weeks and some speculate that it still has further to go.

This week the focus will expand to include ways to protect your overall identity and take back control over what information companies have about you.  Recent legislation allows ISP’s (Internet Service provider) to get into the data mining business and collect information about your browsing history, geo location, and online activity.

Three things you can do to protect  your browsing.
1.    Use a VPN (virtual private network) service that doesn’t log your data.  For a few dollars a month you can set up a VPN service, creating a virtual encrypted network tunnel between your computer and the VPN service provider.  Since all Internet traffic will be coming from the network you connect to at the end of the tunnel, your ISP will be blind to your surfing activities.  VPNs are a must have for people who connect to public wifi connections in coffee shops, libraries, etc.
2.    Use a tor browser:  Tor obfuscates your traffic by sending it through a free relay network which helps to conceal location and browsing information from anyone conducting network surveillance, including your ISP.

3.    Make sure the sites you browse leverage HTTPS instead of HTTP.  HTTPS traffic is encrypted, and while your ISP can see the site that you visit (unless using a VPN or tor browser) it won’t be able to see and record as much of what you are doing on the site.

4.    Use a web browser that has built in tracking prevention and/or install 3rd party extensions such as Ghostery, Ad Block, uBlock Origin or Privacy Badger.  Reminder:  Some sites rely on ad revenue to survive.  Consider white listing the sites you frequent, and those sites that promise an ad-light experience.
Write up on new Safari tracking prevention:

Secure Email – Setup time 10 minutes.  Cost:  free or a small monthly fee.
All of the free email providers (Yahoo! (Verizon), Gmail, Hotmail (Microsoft)) and many of the paid providers (Comcast, other ISPs, etc.) scrub your email for content and sell metadata about you.  All of the major social media providers (Facebook, Twitter, Instagram, Snapchat) also collect and store information about you, not only is this information available for sale in metadata form, it’s also available to the federal government.

The PRISIM program allows for the collection of Internet communications from at least nine Internet companies.  The data collected includes E-mail, Chat (video & voice), Videos, Photos, Stored data,  VoIP, File Transfers, Video Conferencing, login data, Social networking details (Geo locations, etc).

If you wish to exclude yourself and your data from this type of collection then a place to start is by making sure your personal email is encrypted in transit and at rest by using a secure email provider.

Proton mail is a provider that offers encrypted email with data stored on servers in Switzerland, a country known for its privacy laws.  Proton mail is unable to provide access to your data to any country or entity because 1.  Swiss laws do not allow it.  2.  Proton mail does not have cryptographic access to your data.

Read More

Topics: Cyber Security