News

Protect your systems

Aug 2, 2022

Bad actors scan the internet continuously for easy targets and systematically try to both find and break into all systems they find using the internet.  Sometimes your users will be the ones to bring the attackers to your front door by visiting a malware website from a mass text message or spam message.   Attackers attack the weakest systems.  Don’t be the slowest antelope that they come across.

At a recent security webinar, attendees were reminded of some of the basic infrastructure security principles.  Some of these seem pretty fundamental but it’s always good to have a reminder to stay vigilant.   Here are the high points that might be valuable to remember often.

  • Virus Protection is not enough.  The world is constantly changing and pattern-based virus protection is not enough to protect an organization.  Some of the most devasting malware and viruses are zero-day virus that haven’t been identified yet by antivirus vendors.
  • Not all threats are file based.  Some are delivered via standard Windows tools, web browsing, and/or scripting without ever putting a rogue binary on your systems.
  • If you are not automating patching and security, you are falling behind.  You need to have the vulnerabilities closed before they are exploited.
  • You need to review logs and have appropriate monitoring.  Security is not a set it and forget it approach as the threats are constantly changing and evolving and examining logs will help companies pick up trends and abnormal activities.

Additionally, make sure you are taking backups but even more importantly, make sure you are testing your restores to make sure the backups you are taking are valid and your processes are understood and can be executed when needed.

Citrix Gateway and ADC vulnerability discovered

Citrix recently issued a CVE bulletin related to an exploit that could allow Unauthorized access to Gateway User Capabilities. The CVE is 2022-27510 and is covered in the following KB article. https://support.citrix.com/article/CTX463706 This vulnerability could allow...

End of Support for vSphere 6.7

vSphere 8 has been announced and VMware has also announced vSphere 6.7 End of Life dates.

Tech Industry Recognition for Newtek’s Cloud Nine Services

Newtek would like to extend its congratulations to members of our Cloud Nine teams for their recent industry recognitions.CitrixAndy Paul President, Cloud Nine ServicesThe Citrix Technology Advocate program recognizes Citrix enthusiasts and experts for their...

Assess Your Risk Tolerance in the Cloud

Recent technical advancements in cloud virtualization and migration have made way for today’s new wave of remote working.  In fact, migrating end user computing (EUC) to the cloud can offer huge advantages to organizations in terms of user productivity, including...

Critical Citrix Updates Required. Are You Vulnerable?

News outlets are covering a critical vulnerability which has been identified in Citrix Application Delivery Controller and Citrix Gateway (formerly known as NetScaler ADC and NetScaler Gateway), that, if exploited, could allow an unauthenticated attacker (anyone on...