Integrated IT Solutions News February 2014
 
IE users at risk from hackers

Microsoft last Thursday said that both Internet Explorer 10 and its predecessor, IE9, were under attack by hackers exploiting an unpatched flaw in the browsers.

"Microsoft is aware of limited, targeted attacks against Internet Explorer 9 and 10. As our investigation continues, we recommend customers upgrade to Internet Explorer 11 for added protection," a Microsoft spokesperson said via email.

With both IE9 and IE10 vulnerable and under attack, it means that about a third of all those using Internet Explorer are at risk.

Microsoft has not said if it will issue an "out-of-band" security update -- a rush fix shipped before the next regularly-scheduled Patch Tuesday of March 11 -- or yet issued a formal security advisory. We will keep you updated as we learn more info.

New HP Server Firmware Restrictions

HP recently announced that effective February 19th, it is restricting access to firmware and service pack upgrades for its ProLiant server line to customers with existing warranty or support agreements. The system-level fixes have always been free of charge to anyone.

VP Mary McCoy of HP says "This decision reinforces our goal to provide access to the latest HP firmware, which is valuable intellectual property, for our customers who have chosen to maximize and protect their IT investments."

At Integrated IT, we have always strongly recommended the extra level of support an HP CarePack provides when purchasing a server from us. If you are concerned you may not have a support agreement in place for your HP server, call us and we will be able to check your serial number.

Microsoft Software End of Life Countdown: 53 Days

Customers running Windows XP, Office 2003 and Exchange Server 2003 will no longer receive security updates, support, or hot fixes from Microsoft, making their systems extremely vulnerable to malicious software and compliance issues on April 8th, 2014. Contact us for more information on upgrading your software..

Safe file sharing in the cloud: what you need to know

Sync and share file-based collaboration is a great business utility for the cloud. When you place your files on DropBox, Box, or Drive, etc., you might assume that it is safe from prying eyes. Data is encrypted on the wire when syncing and it is encrypted on the server, with an encryption key that is known to the cloud provider's IT staff, thus making it not entirely snoop-proof. Using what is known as “double-blind” encryption, some vendors allow subscribers to lock their data locally with their own private key before sending it. When the data arrives on the cloud’s servers it is in its own unique encrypted “package” where it then given an outer encryption package by the host.  Only the owner of the data can unlock that encryption envelope.  If the data is copied or moved from the server by a unauthorized party, they will need two keys to unlock it. Researching file sharing services is necessary, especially if your industry has compliance issues with data.

 

 

Integrated IT Solutions is an Employee-Owned, ISO 9001 Certified Company.

If you wish to UNSUBSCRIBE click here.