Archive for the ‘Patches’ Category
Patching Nightmare – Please Forward to Your IT Pros
Intel says, again, to stop deploying patches. Java and other new patches need handling. Continue reading ‘Patching Nightmare – Please Forward to Your IT Pros’
Posted by Mike Foster in Adobe, Adobe Flash, Applying IT Patches, Best Practices, IT Security, Patch Updates, Patches, Preventative IT Security Breach, Technology Safety Tips on January 23rd, 2018.
Tags: CPU Chip Flaws, CPU Chips, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, deploying patches, hackers, Intel, Internet Safety Tips, it best practices, IT network security, IT pros, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, java, Java SE patch, Oracle patches, patching nightmare, security vulnerability, tech support
Get Apple’s Urgent Patches that Fix Dozens of Security Holes
For those of you with Apple products, Apple just released some important updates.
Knowing that updates might cause a problem, please back up your computer first. You are backing up all the time already, right? Time Machine is a wonderful tool and is built in. If you want to supplement Time Machine with an additional backup, Carbon Copy Cloner from Bombich dot com is very popular and clients experience great results. You’ll need a couple of external USB drives, but the investment is worth it.
In case you are not familiar with how to apply patches, here are instructions:
On your Apple computer, even if your computer is set for automatic updates, it is good to verify that you have the most recent patches. Click on the image of the apple in the top left corner, and choose App Store. If not already selected, choose Updates inside the title bar that already contains the words: Featured, Top Charts, Categories, Purchased, and Updates. You may see many updates for your applications, and those are fine to apply, but the urgent one is the update called macOS Sierra Update and the version is 10.12.5. If you’ve not updated in a while, you may see other macOS updates too.
iPhone and iPad users, press on the Settings icon that looks like a gear. In the left-hand column, select General, and you’ll see Software Update on the right-hand column near the top. The most recent patch is for iOS 10.3.2.
If you want to configure automatic updates for your Apple computers, find instructions by searching for this phrase in Google: Automatic security updates os x site:apple.com
If you want to configure automatic updates for the iPhone and iPad, find instructions by searching for this phrase in Google: Automatic security downloads iOS site:apple.com
Please forward this to everyone you know who uses Apple devices and you want to help be more secure…
Posted by Mike Foster in Apple, Applying IT Patches, Data Loss Prevention, IT Best Practices, IT Security, Patch Release, Patch Updates, Patches, Technology Tips on May 17th, 2017.
Tags: apple patch, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, fix security holes, hackers, how to apply apple patch, Internet Safety Tips, ipad updates, iphone updates, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, risk management, Security expert, tech support, updating apple products
Patching – 10 Steps to Seal the Holes in Your Armor
You’ve likely heard of the massive ransomware attack that has taken down so many organizations, including hospitals, around the world. The ransomware appears to have exploited a bug for which Microsoft released a fix a little over a month ago. Follow these 10 steps to help protect your organization from this, and from future attacks: Continue reading ‘Patching – 10 Steps to Seal the Holes in Your Armor’
Posted by Mike Foster in Applying IT Patches, Best Practices, browser security, Cyber Attacks, Cyber Security Breach, Data Loss Prevention, IT Best Practices, IT Security, Malware, Online Security, Patch Updates, Patches, Ransomware, Security Breach on May 15th, 2017.
Tags: applying patches, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, hackers, Internet Safety Tips, ipad security, iphone Security, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, Microsoft patch, network security, patch deployment, patch management, patches, Ransomware, ransomware attack, risk management, Security expert, tech support, updating patches
Alert Your IT Team – Urgent Patch for Network Servers
Many organizations use VMware to host their servers. VMware has released an urgent update they label as Continue reading ‘Alert Your IT Team – Urgent Patch for Network Servers’
Posted by Mike Foster in Applying IT Patches, Best Practices, Executive Tips, Executives and IT, IT Best Practices, IT Security, Patch Release, Patch Updates, Patches on April 18th, 2017.
Tags: cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, hackers, Internet Safety Tips, it best practices, IT network security, IT professionals, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, patch deployment, patches, Patching, pre-testing patches, risk management, Security expert, tech support, VMware
Alert IT to Graphics Component Patches
Security patches are so important to security, but they are difficult to manage and you always stand the risk of a patch interrupting productivity. And there are some new patches your IT team needs to know about… Continue reading ‘Alert IT to Graphics Component Patches’
Posted by Mike Foster in Executive Tips, Executives and IT, IT Best Practices, IT Security, Patch Release, Patch Updates, Patches, Ransomware on February 9th, 2017.
Tags: cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, Graphics Component Patches, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, Microsoft patches, patches, Ransomware, risk management, Security expert, tech support, updating patches
Only One Virus is a Huge Problem
If your office has even one instance of a virus, ransomware, or any other kind of malware, that is a huge symptom. Continue reading ‘Only One Virus is a Huge Problem’
Posted by Mike Foster in Application Updates, Applying IT Patches, Best Practices, Cyber Attacks, Cyber Security, Cyber Security Breach, Infected Apps, Invisible Security Threats, IT Best Practices, IT Security, IT Virus, Malware, Online Security, Patches, Ransomware, Virus on November 3rd, 2016.
Tags: Click to Play, cyber infection, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, Cyber Security Tips, cyber security warning IT Pro Tips, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, malware, network security protections, Ransomware, risk management, Security expert, tech support, updating patches, virus, virus infections
Cyber Security’s Three Essential Steps
In this time of gratitude, which is perhaps the most important foundation of happiness and success, it is important to thank you for helping make the world a safer place. Three controls, perhaps the most important three controls, help protect you from cyber-threats. They are: Continue reading ‘Cyber Security’s Three Essential Steps’
Posted by Mike Foster in Application Whitelisting, Applying IT Patches, Cyber Security, IT Security, Patches, Preventative IT Security Breach, Technology Safety, Technology Safety Tips, Technology Tips on November 25th, 2015.
Tags: application patches, application whitelisting, cyber security, Cyber Security Best Practices, Cyber Security Breach, cyber security business strategy, Cyber Security Consultant, cyber security expert, Cyber Security Tips, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, IT Support, Local Admin rights, patch updates, program installation, risk management, tech support
Microsoft Using Your Computer To Deliver Software
Microsoft built a feature into Windows 10 called Delivery Optimization. Your computer may deliver and receive apps and patches to and from computers belonging to complete strangers. Your computer becomes a server to deliver patches and apps to people on the Internet. Though it is likely enabled on your computers, you can turn this feature off. Continue reading ‘Microsoft Using Your Computer To Deliver Software’
Posted by Mike Foster in Applying IT Patches, hotspot safety, IT Best Practices, IT Settings, Microsoft Settings, Patches, Technology Safety, Technology Safety Tips, Windows 10 on August 31st, 2015.
Tags: cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, cyber security expert, Cyber Security Tips, Delivery Optimization, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, IT Settings, Microsoft Settings, risk management, tech support, Windows 10
Huge Change in Scheduled Patches
IT Pros know to clear their calendars right after the second Tuesday of the month. Dubbed “Patch Tuesday,” that’s when Microsoft releases most patches. Microsoft announced they are abandoning that practice and will release patches ASAP when they are available. What it means for your IT Pros… Continue reading ‘Huge Change in Scheduled Patches’
Posted by Mike Foster in Applying IT Patches, Best Practices, Cyber Security, IT Best Practices, IT Pro Tips, IT Security, Patch Release, Patches, Technology Safety Tips on May 7th, 2015.
Tags: adobe patches, cyber security, Cyber Security Best Practices, Cyber Security Breach, Cyber Security Consultant, cyber security expert, Cyber Security Tips, hackers, Internet Safety Tips, it best practices, IT network security, IT pros, it risk management, it security audit, IT security consultant, it security expert, IT security procedures, it security review, IT security training, Microsoft patches, patch, patch deployment, patch release, patches, risk management, scheduled patches, tech support
- Watch Mike on YouTube
- Follow @safenetwork
- Join Mike on Facebook
- Connect with Mike Foster
- Subscribe to the Blog
Recent Blog Posts
- New York City is Providing Automatic Protection for all iPhone Users, and So Can Your City
- A New Opportunity for Your IT Pros to Protect your Servers
- How Buying a Spare Printer can Vastly Improve Your Cyber Security
- When Trusted Programs get Hacked: An Attacker May Be Putting Germs on Your Toothbrush
- Patching Nightmare – Please Forward to Your IT Pros
- Three Serious Trends to Watch Out for in Cyber Security
- Major Flaw in Computer Processors Affects Security
- Protecting and Restricting iPads, iPhones, and Android Devices
Blog Topics
- Account Lockout Policy
- ACH Fraud
- Acronis True Image
- Adobe
- Adobe Flash
- AI
- Airport Safety
- Android
- Anti-virus
- Apple
- Apple Virus
- Application Updates
- Application Whitelisting
- Applying IT Patches
- Backup
- Best Practices
- Big Screen iphone
- Bitcoin
- Bitlocker
- Bromium
- browser security
- Carbon Copy Cloner
- CCleaner
- Children
- Cloud
- Computer Processor
- Credit Bureaus
- Credit Card Security
- Credit Freeze
- Customer Service
- Cyber Attacks
- Cyber Future
- Cyber Scams
- Cyber Security
- Cyber Security Breach
- Cyber Security Training
- Data Loss Prevention
- Data Restoration
- DEF COM
- Disaster Recovery
- Download
- Equifax
- Executive Tips
- Executives and IT
- Family Cyber Safety
- Fire Phone
- Firefox
- Firing IT Firms
- free wifi
- FTC
- Gmail
- Google Docs
- GoToMyPC
- Hacker Insight
- Hackers
- Hacking Competition
- Heartbleed
- High Sierra
- Home Computers
- hotspot
- hotspot safety
- Identity Theft
- Infected Apps
- International Security
- Invisible Security Threats
- iOS 11
- IT Best Practices
- IT Compliance
- IT Discussions
- IT Future
- IT Network
- IT Pay
- IT Pro Tips
- IT Professionals
- IT Security
- IT Settings
- IT Training
- IT Virus
- IT Workshops
- java
- Kasperski
- KRACK
- laptops
- LastPass
- Learn to Program
- Linux Patch
- Mac Protection
- Mac Virus
- MacBook
- Malware
- Microsoft Patch
- Microsoft Settings
- Mimecast
- MINIX
- mobile devices
- National Security Agency
- NIST
- NIST Recommendations
- NSA
- NYC Secure
- Online Impersonators
- Online Security
- Operating Systems
- Outsourced IT Firms
- Outsourcing IT
- password
- Password Manager
- Password Safety
- Password Security
- Patch Release
- Patch Updates
- Patches
- Petya
- phones
- Preventative IT Mainenance
- Preventative IT Security Breach
- Programs
- Project Management
- Pwn2Own
- Ransomware
- Remote Workers
- Restoring
- Ring Potential Three
- RSA
- Save time
- Scratch
- Security Breach
- Security Logs
- Shadow Protect Desktop
- Sir Michael Fallon
- social media
- Solid State Drives
- Spam
- Spam Phishing
- SSD
- Stolen Data
- Student Cyber Security
- SuperTech 2015
- SuperTech 2016
- surface pro
- Targeted Threat Protection
- TeamViewer
- Technology
- Technology Distractions
- Technology Safety
- Technology Safety Tips
- Technology Security
- Technology Tips
- Threat Protection Software
- touch screen
- Troubleshooting
- Turkish Crime Family
- two set logon
- two step login
- UK
- Uninstall
- Upgrade
- Videos
- VirtusTotal.com
- Virus
- WDAG
- Website Security
- Whitelisting
- wi-fi best practices
- wi-fi safety
- wi-fi security
- Windows 10
- Wire Transfer Fraud
- Working with IT
- Workplace Safety
- Workplace Shooter
- Yahoo