About Us

IT Services

Electronic Security

Knowledge Center

News & Events



Contact Us

  • Register

Prosper Solutions Blog

Prosper Solutions has been serving the Chelsea area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

Only 15 of the vulnerabilities affected Windows itself, but the others addressed issues with other Microsoft products, including Internet Explorer, Microsoft Edge, SharePoint, SQL Server, Hyper-V, and Kernel. Yet, only two of these flaws affected every single version of Windows and Windows Server, and none of them were being exploited in the wild by hackers.

One of these vulnerabilities demands your immediate attention, though, and that is the one that has your Windows Search feature in its crosshairs. This vulnerability, coded by Microsoft as CVE-2017-8620, can use the Server Management Block (SMB) to remotely control a system, be it a Windows Server unit or a Windows workstation. Since the flaw isn’t located in SMB itself, it isn’t affected by other threats like the notorious WannaCry ransomware and NotPetya.

This Windows advisory claims that the vulnerability takes advantage of the way that Windows Search works with objects in memory. A hacker can send customized messages through the Windows Search function to change user permissions. They can then take full advantage of their permissions to install, remove, or change applications on any infected device. They can also view, change, or delete any data that’s stored on it, or create a new account just for them with full administrator privileges.

A vulnerability like this is exactly what a hacker wants. They can basically take full control over a victim’s computer with minimum trouble. If you implement patches and security updates as they are released, you shouldn’t have anything to worry about. Does your business have an organized approach to implementing security patches? If not, there are solutions available that you can use to keep security at a maximum.

Outsourced IT often includes remote patching and maintenance that can be used, even by small businesses. Even better, it does this without costing your business an arm and a leg. Enterprise-level solutions are often the only way for your business to thrive in a world filled with competition, but that’s because they provide a significant benefit to your organization that you can’t afford to ignore. We can improve your network security in the same way as an internal IT department, but without the costs associated with adding new salaries to your budget. Prosper Solutions can help your organization implement new security solutions like remote monitoring and maintenance. To learn more, reach out to us at (617) 369-9977.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 22 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

hardware Devices Mobile Device Data Loss Automobile Scalability Managed Service Provider IT Support Customer Relationship Management Website Streaming Media Miscellaneous Software License Inbound Marketing Smartphone Reliable Computing Wi-Fi Language IBM Windows 10 Ransomware Cryptocurrency USB Current Events Avoiding Downtime Patch Management Data Backup Fake News CrashOverride switches Pain Points Electricity Holiday cloud Alert Business Growth Chrome Robot Settings Worker Music Outsourced IT Tech Terms Cost Management Internet of Things Advertising Outlook UTM HIPAA Startup Taxes Computer Public Cloud Printer How To Email SharePoint Mobility Gadgets Database Update Politics Office Tips Saving Time Windows 7 Digital Payment Cabling Processors Solid State Drive In Internet of Things Distributed Denial of Service IT Management Rental Service Maintenance Social Experience Social Engineering Managed IT Scam End of Support Tech Support Knowledge Encryption Motion Sickness Device security Lithium-ion battery Technology Business Owner Licensing Hacks Healthcare Identity Theft DDoS Antivirus Monitoring Excel Supercomputer LiFi Managed IT services Uninterrupted Power Supply Regulations Multi-Factor Security Migration IP Address Hackers Screen Reader Password eWaste Hosted Solutions Printing Saving Money Congratulations SaaS Firewall Business Computing Tablet Virtual Desktop Business Banking Phishing Permissions Search Business Metrics Government outsource cloud computing Keyboard Quick Tips Accountants Passwords Download Business Mangement Evernote Travel Tech Term Computer Accessories Computers Backup Data Management Business Technology Operating System IT consulting Efficiency User Notifications Gmail Digital Signature Apple Safety Tracking Health Human Resources Cache Big data Employer-Employee Relationship Google Drive Access Flexibility IT Support Windows XP Data Recovery Television Best Practices Virtualization Law Enforcement Bandwidth Administration Browser Management communications HTML Facebook User Error Access Control Best Available Productivity Technology Tips Innovation Meetings Digital Network Congestion Public Speaking Malware Samsung Upgrades Work/Life Balance Hiring/Firing Company Culture Smartphones IT Services Save Money Computer Malfunction Information Technology Running Cable YouTube Windows 10 Word App BDR Remote Computing PowerPoint Entrepreneur Books Tip of the Week IT Consultant Software as a Service User Tips Staffing Presentation Router Botnet Windows Productuvuty Touchscreen Training Securty Drones Fiber-Optic Mobile Computing Sports Mobile Security Applications Social Media Small Business Freedom of Information Desktop Capital Time Management Help Desk Start Menu Hosted Solution Unified Threat Management Mobile Payment Application Bata Backup Mobile Devices Downloads Document Management Trending Google Maps Micrsooft Workers Spyware Deep Learning Collaboration Two-factor Authentication Upgrade Office 365 Addiction Corporate Profile Assessment Risk Management Equifax Computer Care Remote Monitoring Mouse cloud storage Value Save Time Chromebook Retail Memory Audit Machine Learning Hard Drives Society Business Continuity Networking Specifications Google Docs Vulnerability Legislation Internet Patching Tactics Relocation Artificial Intelligence Text Messaging Virus Administrator Citrix Xenapp Hack PDF Thank You Skype Software Customer Service Spam Data Breach Windows10 Bluetooth Laptop Cybersecurity cyber security CCTV Security Blockchain Intranet Employer Employee Relationship Google Wallet Reading Redundancy Data Bring Your Own Device Storage Troubleshooting Proactive IT Computer Repair MSP News Automation Net Neutrality Electronic Payment Physical Security Bitcoin Augmented Reality Comparison Hard Drive Disposal email scam Teamwork Virtual Assistant Microsoft Excel Cleaning Workplace Tips History Entertainment Privacy Downtime Fraud VPN Domains Wireless Technology Disaster Recovery Server Money Statistics Network Security Analytic Business Intelligence Multi-factor Authentication uptime Analytics Twitter Read Cortana Going Green G Suite Legal Microsoft Office File Sharing Project Management Windows Server 2008 Heating/Cooling Hacker Mobile Device Management Vendor Mangement Messenger Co-Managed IT Conferencing Environment Compliance Paperless Office Social Networking Product Reviews VoIP the Internet of Things Vendor Management Apps Disaster Data Security Cybercrime CIO Data Protection WiFi Recovery outsource cloud storage Best Practice Google Calendar Hacking cloud computing Vulnerabilities IT service Private Cloud IT Plan Network Computing Infrastructure Visible Light Communication Monitors Wireless Budget Unified Communications Education Phone System Flash Office Emails Emergency Writing Managed IT Services Displays Sync Microchip Hard Drive Computing VoIP Marketing Programming Business Management Websites Tip of the week Unified Threat Management iPhone Data storage Virtual Reality Web Server Wireless Headphones Gaming Console Nanotechnology Smart Tech Documents Windows 8 Black Market Piracy Business Cards clout services IT Shortcut Microsoft Google BYOD Mobile Technology Communication Productivity Android Tablets Competition Telephony 3D Printing Backup and Disaster Recovery Webcam Telephone Systems Consultation WannaCry Data Warehousing Content Filtering

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150