Security

Top 5 Reasons Why You Need Security Awareness Training In 2018

2017 was the most intensive IT security year on record - see our blog on "Top 10 IT Cyber Security 2017 Facts and Stats". To start 2018 with a simple, effective, IT security strategy is an excellent New Year's resolution and helps your business stay  in business. This list provides a high-level strategy you need [...]

Network Protection – Integrating SonicWall DPI-SSL

The Internet is a realm on which people can share information and experience. This open forum creates an endless amount of knowledge and experience. However, it is also a place where computers can very easily be affected by malware including viruses, ransomware, worms, trojans, spyware, adware, and others. Webpage creators know how to get peoples’ [...]

By | June 22nd, 2017|Antivirus, Managed IT Security, Network, Security, Wi-Fi|0 Comments

Sharing Network Access Between Businesses Using VLANs

In high density office buildings, small businesses often have to share office space and sometimes resources. In one case, a company had excess office space and rented it out to another company. The new tenants suggested that they both use the same existing printer. This necessitated both businesses having access to the same network. Sharing [...]

By | May 31st, 2017|guide, Managed IT Services, Network, Security, Server, Wi-Fi|0 Comments

Network Reconstruction – The IT Support Miami Way

A company in South Florida had technical problems and asked their IT provider to recover their servers’ backup. The company’s network was unavailable. Its productivity was brought to a halt until the servers were up and running again. The IT provider did not manage to retrieve the backup for two full days and the backup [...]

Performing Efficient International Server Migration

Client Request At IT Support Miami, we cater to all manner of request for our many clients. We provide efficient solutions to their problems. We handle any requests from installing individual computer software to large-scale international server migration. Recently, a client requested that we transfer the data from their physical server in a data center [...]

Updating Firewall Security Significantly Reduces Risk

Firewall Security Patches Firewalls are the first line of security for the enterprise – be it a small business or multinational corporation. Most businesses never update or check the firmware of their gateway appliance. Firewalls and network devices are shipped with basic operating systems and require constant updates from the time of installation through their [...]

CSS Directive Causes MS Outlook To Crash April 7 2017

Microsoft Outlook Denial of Service Microsoft Outlook is an email client used to send and receive email messages. Recently, SonicWALL received reports of a bug in MS Outlook, wherein a specially crafted email causes it to crash shortly after reading. The email to contain both text and html portions, as shown below: CSS Directive [...]

Adobe 0-day Vulnerability Leads to Remote Code Execution (Oct 31, 2016)

Adobe 0-day Vulnerability Leads to Remote Code Execution (Oct 31, 2016) Adobe recently released an update to the Adobe Flash Player to address a 0-day vulnerability, which they claim is being exploited in limited targeted attacks. The vulnerability, CVE-2016-7855, is a use-after-free vulnerability. An attacker could exploit this vulnerability remotely by crafting an SWF file, [...]

By | November 7th, 2016|Antivirus, Security|0 Comments

Cybersecurity in Project Management

Why Security in Project Management? Need to protect the confidentiality, integrity and availability of project information. IT Security and Project Management are relatively young professions. IT Security is becoming a paramount concern for project managers. No real project management standard (addressed mildly in ISO 27001 2013 policy and procedures in ISO 27002 procedures).   ISO [...]

By | September 28th, 2016|Security|0 Comments

Hurricane Preparation Guide and Tips

Hurricane Watch   Upon the declaration of a hurricane watch you should take these initial precautionary steps to: Backup and Secure Data Files - Your data files are valued information assets. If you have access to a network File Server, it is recommended you copy critical information files to the server. Please limit file server [...]

By | August 27th, 2016|guide, Microsoft, OS, Security, Uncategorized|0 Comments