Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Prosper Solutions has been serving the Chelsea area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

Only 15 of the vulnerabilities affected Windows itself, but the others addressed issues with other Microsoft products, including Internet Explorer, Microsoft Edge, SharePoint, SQL Server, Hyper-V, and Kernel. Yet, only two of these flaws affected every single version of Windows and Windows Server, and none of them were being exploited in the wild by hackers.

One of these vulnerabilities demands your immediate attention, though, and that is the one that has your Windows Search feature in its crosshairs. This vulnerability, coded by Microsoft as CVE-2017-8620, can use the Server Management Block (SMB) to remotely control a system, be it a Windows Server unit or a Windows workstation. Since the flaw isn’t located in SMB itself, it isn’t affected by other threats like the notorious WannaCry ransomware and NotPetya.

This Windows advisory claims that the vulnerability takes advantage of the way that Windows Search works with objects in memory. A hacker can send customized messages through the Windows Search function to change user permissions. They can then take full advantage of their permissions to install, remove, or change applications on any infected device. They can also view, change, or delete any data that’s stored on it, or create a new account just for them with full administrator privileges.

A vulnerability like this is exactly what a hacker wants. They can basically take full control over a victim’s computer with minimum trouble. If you implement patches and security updates as they are released, you shouldn’t have anything to worry about. Does your business have an organized approach to implementing security patches? If not, there are solutions available that you can use to keep security at a maximum.

Outsourced IT often includes remote patching and maintenance that can be used, even by small businesses. Even better, it does this without costing your business an arm and a leg. Enterprise-level solutions are often the only way for your business to thrive in a world filled with competition, but that’s because they provide a significant benefit to your organization that you can’t afford to ignore. We can improve your network security in the same way as an internal IT department, but without the costs associated with adding new salaries to your budget. Prosper Solutions can help your organization implement new security solutions like remote monitoring and maintenance. To learn more, reach out to us at (617) 369-9977.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 25 September 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Computer Hacker Smartphone YouTube Public Speaking In Internet of Things Operating System Browser Keyboard Business Intelligence Intranet Paperless Office Black Market CCTV Books Windows Data Backup Emergency Mobility Business hardware Access iPhone BDR USB Downtime Passwords Windows 10 Inbound Marketing Technology Wireless Wireless Technology Email Access Control Language Statistics Settings IP Address Physical Security Unified Threat Management Capital CrashOverride Business Mangement Machine Learning Saving Money Touchscreen Comparison Micrsooft Business Continuity Storage Miscellaneous Deep Learning Upgrade Social Engineering User Tips Displays Business Growth Banking Virtual Desktop Google Wallet Trending Office 365 Mobile Computing Processors IT Services Worker Automation communications Website Public Cloud Server Webcam Windows XP Artificial Intelligence Virtual Reality uptime Firewall IT Consultant Competition Tech Terms Office Distributed Denial of Service Human Resources Bluetooth Securty Government DDoS Entertainment Regulations Troubleshooting Holiday Analytic Redundancy Phishing Network Congestion Relocation Innovation the Internet of Things Communication Antivirus Smartphones Save Money Identity Theft Word How To Two-factor Authentication SaaS Proactive IT Office Tips Software as a Service Private Cloud Unified Communications Data Management Skype Business Computing Corporate Profile Google Maps Download LiFi Advertising Unified Threat Management Microsoft Office Patching File Sharing Mobile Devices Bata Backup Education cloud computing Solid State Drive Computing Infrastructure Hard Drives Encryption History Bandwidth Retail Managed IT services WannaCry Law Enforcement Society Best Practices Managed IT Services Health VoIP Productivity IT Support Web Server Time Management Augmented Reality Chrome Current Events CIO WiFi Efficiency Vendor Management Digital Signature Google Docs Sports Start Menu Monitors Work/Life Balance Emails Hackers switches Network Security User Domains PDF Cryptocurrency G Suite Employer Employee Relationship Hacking Rental Service Cybersecurity Phone System Windows 8 Facebook Experience Hiring/Firing Business Technology App Politics Hacks Business Metrics Music eWaste Telephony outsource cloud storage Gadgets Business Management Computer Care Workplace Tips Spam Employer-Employee Relationship Thank You Safety Money Quick Tips Mobile Device Management Outlook Customer Relationship Management Running Cable Maintenance Content Filtering Streaming Media Backup Social Media Microsoft Remote Computing Product Reviews Sync Recovery Scam Password Telephone Systems Gmail Cybercrime Collaboration Information Technology Taxes MSP Best Practice Data storage Reliable Computing Disaster Writing Apps Tablet Administrator Heating/Cooling Apple Help Desk cloud storage Printer Small Business Remote Monitoring Staffing Uninterrupted Power Supply Cabling End of Support Hosted Solution HIPAA Spyware Messenger Computer Accessories Best Available Privacy Robot IT service Hosted Solutions Save Time Microchip Cache Licensing Risk Management BYOD Data Cleaning Environment Automobile Tracking Vendor Mangement Android Permissions Tip of the Week Net Neutrality Text Messaging Internet Virtualization Customer Service VoIP Cost Management 3D Printing Patch Management Security Company Culture Business Owner Avoiding Downtime cyber security Scalability Data Recovery Malware Botnet Hard Drive Documents Workers Ransomware Shortcut cloud Lithium-ion battery Managed IT Disaster Recovery Drones Notifications Digital Payment User Error Motion Sickness Tablets Google Value Laptop Internet of Things Alert Search Chromebook Managed Service Provider Electronic Payment Computing Social IT consulting Networking Pain Points Project Management Windows10 Compliance Update Visible Light Communication Programming Bring Your Own Device Document Management Electricity Legal IT Hack Software Computer Repair Productuvuty Meetings Big data Specifications Supercomputer Budget Digital IT Management clout services Vulnerability Citrix Xenapp Twitter Saving Time Cortana Marketing Travel Congratulations Application Network Read VPN Router Knowledge Training Presentation Flash Consultation Assessment outsource cloud computing Tech Support Entrepreneur Windows 10 Virus Computer Malfunction Analytics Teamwork PowerPoint Samsung Co-Managed IT Productivity Social Networking Gaming Console IBM Wi-Fi Outsourced IT Websites Data Protection Upgrades Computers Administration IT Support Memory Going Green Flexibility Reading Google Drive

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150