Jason Shapiro

What Is Vulnerability Scanning And Why Is It Important?

What was the last company you heard about that got hacked?  Do you know how the attackers got in?  Oftentimes the first step in an attack is to scan the victim's systems for vulnerabilities to exploit.  Modern organizations need to regularly...

Tech Book Review: “Click Here to Kill Everybody”

I’ve been on a cybersecurity reading kick lately and reading about cybersecurity can be depressing.  You learn about damaging hack after damaging hack, endless systemic security issues, and global problems that seem intractable.  As an IT...

What is phishing and how do I defend myself from it?

What is Phishing?

Anyone with an email account has received plenty of spam email, including plenty of scams.  Phishing is the fraudulent practice of sending emails that appear to be from legitimate companies or organizationsIt is used in an ...

Windows Printer Troubleshooting

Printers are strange beasts. They act as portals between the virtual and physical worlds, and they can be temperamental. This blog provides helpful suggestions for Windows printer troubleshooting. 

How to Remediate the Recent Dell SupportAssist Remote Code Execution Vulnerability

by Jason Shapiro | May 14, 2019 | Security, cybersecurity

Any IT technician that has installed Windows knows how much of a pain it can be to install all of the correct drivers and keep them up to date. It's gotten easier over the years with improvements to Windows Update and the various tools that now...

Subscribe Here For Our Blogs:

Recent Posts