Home

About Us

IT Services

Electronic Security

Knowledge Center

News & Events

Blog

Support

Contact Us

Blog
  • Register

Prosper Solutions Blog

Prosper Solutions has been serving the Chelsea area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

Only 15 of the vulnerabilities affected Windows itself, but the others addressed issues with other Microsoft products, including Internet Explorer, Microsoft Edge, SharePoint, SQL Server, Hyper-V, and Kernel. Yet, only two of these flaws affected every single version of Windows and Windows Server, and none of them were being exploited in the wild by hackers.

One of these vulnerabilities demands your immediate attention, though, and that is the one that has your Windows Search feature in its crosshairs. This vulnerability, coded by Microsoft as CVE-2017-8620, can use the Server Management Block (SMB) to remotely control a system, be it a Windows Server unit or a Windows workstation. Since the flaw isn’t located in SMB itself, it isn’t affected by other threats like the notorious WannaCry ransomware and NotPetya.

This Windows advisory claims that the vulnerability takes advantage of the way that Windows Search works with objects in memory. A hacker can send customized messages through the Windows Search function to change user permissions. They can then take full advantage of their permissions to install, remove, or change applications on any infected device. They can also view, change, or delete any data that’s stored on it, or create a new account just for them with full administrator privileges.

A vulnerability like this is exactly what a hacker wants. They can basically take full control over a victim’s computer with minimum trouble. If you implement patches and security updates as they are released, you shouldn’t have anything to worry about. Does your business have an organized approach to implementing security patches? If not, there are solutions available that you can use to keep security at a maximum.

Outsourced IT often includes remote patching and maintenance that can be used, even by small businesses. Even better, it does this without costing your business an arm and a leg. Enterprise-level solutions are often the only way for your business to thrive in a world filled with competition, but that’s because they provide a significant benefit to your organization that you can’t afford to ignore. We can improve your network security in the same way as an internal IT department, but without the costs associated with adding new salaries to your budget. Prosper Solutions can help your organization implement new security solutions like remote monitoring and maintenance. To learn more, reach out to us at (617) 369-9977.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 19 November 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Wi-Fi Skype Reading Tech Support MSP Competition Value Office 365 IT Management Time Management Firewall Travel Visible Light Communication Environment Heating/Cooling Encryption Pain Points Rental Service Scam Business Technology Tablets Managed IT services User Tips Mobile Devices Word Websites Television Small Business Government Productivity File Sharing Worker Hosted Solutions Internet of Things Banking Augmented Reality YouTube Recovery Productuvuty Licensing Technology Collaboration Virus Messenger Microsoft Office Virtual Reality Bring Your Own Device User Error HIPAA Comparison Scalability Entrepreneur Upgrades Redundancy Taxes Hard Drives Windows10 Windows Save Money Business Growth IT consulting Corporate Profile outsource cloud storage Memory Data Law Enforcement Black Market Malware CCTV cyber security Phishing Hackers Mobile Technology cloud Advertising Antivirus Computer Care Workplace Tips Quick Tips Phone System Micrsooft IT Support Meetings Social Patch Management Machine Learning Settings Downloads Disaster Recovery Analytic Social Networking Cache Networking Managed IT Services Audit Technology Tips Gadgets Touchscreen Windows 8 Data Loss Automobile Router Inbound Marketing Business Mangement Upgrade Co-Managed IT Vendor Management Bandwidth Windows 10 Writing Regulations Monitors Budget Best Available Keyboard Data Protection End of Support Microsoft Update Google Wallet Processors Disaster Distributed Denial of Service Tech Terms Password Books Windows XP Identity Theft Work/Life Balance Read uptime the Internet of Things CrashOverride Notifications Electricity Emails Supercomputer Business Tablet Data Recovery Mobility Miscellaneous Computing Infrastructure App Safety Software as a Service Email communications Botnet Citrix Xenapp Employer-Employee Relationship Reliable Computing Software Staffing cloud storage Drones Presentation Streaming Media Documents Webcam Microchip Business Intelligence Managed Service Provider Entertainment Help Desk Mobile Device Network Congestion Flash Emergency Permissions Bata Backup Sports VPN User IT Consultant Compliance Vulnerability Saving Money Productivity Browser Sync Cryptocurrency Web Server Apple Best Practices Trending Mobile Computing Consultation Administrator 3D Printing Net Neutrality Domains Outlook DDoS Telephone Systems Electronic Payment Displays Analytics Wireless Technology Politics Project Management SaaS Google Docs Uninterrupted Power Supply Music How To Proactive IT Spam IT Services Twitter Tip of the Week Current Events Downtime Thank You Network Passwords WiFi Troubleshooting Computer Digital Signature Statistics Specifications Computer Repair Vendor Mangement Paperless Office Windows 10 Chrome VoIP Running Cable Health Office Office Tips Capital Remote Computing Cabling Digital Payment Patching clout services Tracking Motion Sickness Outsourced IT Managed IT Cybersecurity Download WannaCry Ransomware Congratulations Backup Business Continuity Company Culture Robot Computing Public Cloud Android Hacker eWaste Business Computing outsource cloud computing Access Control Data Backup Programming Virtualization Network Security Telephony Deep Learning Security Unified Communications G Suite Google Calendar Smartphones Social Engineering Website IP Address VoIP Automation Shortcut Relocation Data Breach PowerPoint Experience USB Cybercrime Assessment Public Speaking Business Management Application Document Management Maintenance History Risk Management Hosted Solution Training Computers Google Communication Cleaning Gmail Information Technology Retail Business Metrics Intranet Language BYOD Two-factor Authentication LiFi switches Workers Marketing Securty Product Reviews PDF Google Maps IBM Printer IT Support IT Hacks Efficiency Customer Service Going Green Smartphone Social Media Virtual Desktop Hiring/Firing CIO hardware Alert Remote Monitoring Data Security Hacking Employer Employee Relationship Mobile Device Management Samsung Content Filtering Computer Malfunction Business Owner Server Internet Lithium-ion battery Artificial Intelligence Education Operating System Cost Management Customer Relationship Management Best Practice In Internet of Things Chromebook Search Gaming Console Private Cloud Bluetooth Mobile Payment IT service Hard Drive Unified Threat Management Storage Facebook Innovation cloud computing Human Resources Money iPhone Avoiding Downtime Data Management Big data Wireless Laptop Teamwork Save Time Apps Access Society Physical Security Solid State Drive Hack Mouse Privacy Data storage Saving Time Holiday Computer Accessories Legal Printing Spyware BDR Digital Start Menu Knowledge Google Drive Cortana Text Messaging Unified Threat Management Administration Flexibility

Latest News & Events

Prosper Solutions is proud to announce the launch of our new website at http://www.prospersolutions.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Prosper Solutions can do for your business.

Call Us Today
Call us today
(617) 369-9977

150 Eastern Ave, Second Floor
Chelsea, Massachusetts 02150