RISK: How To Secure Your End of Life Servers

The End of Support (EOS) of Microsoft Windows Server 2003 in July 2015 will put millions of enterprise servers at risk. If your organization uses Microsoft Server 2003, the EOS will introduce serious security risks unless you are fully prepared to migrate to a new platform or put compensating controls in place. Because hackers know that Microsoft will no longer acknowledge or patch vulnerabilities, these servers will quickly become a favorite target for attacks.

Spotlight

TechEase Computer Solutions, LLC

Offering computer and network support for small businesses and non-profits in Santa Barbara, TechEase is your personal IT department. Services include networking, security, server administration, end user support, spyware and virus infections, data recovery, laptop power jack repair, laptop lcd screen repair, remote access, disaster planning, software and hardware upgrades, maintenance and all other needs associated with business IT infrastructure.

OTHER WHITEPAPERS
news image

State Of Zero Trust in The Enterprise:Shift To Identity-Powered Security

whitePaper | October 27, 2022

Cybersecurity has changed. The attack surface has expanded, thanks to the rapid adoption of cloud applications and services, shift to remote work, and proliferation of mobile devices. Having enterprise systems, applications, and data in one location and relying on layers of security tools and controls to keep attackers out, is no longer sufficient when the bulk of data and workloads now live outside the traditional network. Attackers are also increasingly targeting credentials to appear as legitimate users.

Read More
news image

Building the next generation of security and privacy professionals

whitePaper | October 4, 2022

Organizational practices in the digital age are inevitably linked to the processing of data, and built upon the systems that support these efforts. Collectively, cybersecurity and privacy professionals are responsible for guiding and implementing organizational decisions that ensure data is collected, processed, protected and shared consistent with evolving norms.

Read More
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More
news image

Cross-Generational Security Of Mobile Telephony

whitePaper | August 4, 2022

Abstract— With the recent roll-outs of 5G networks and the rise of phones supporting the standard, it’s critical to examine the technical underpinnings of 5G system security. The fifth generation of 3GPP (3rd Generation Partnership Project) mobile telephony, the lack of understanding, outright hostility, and general confusion surrounding this roll-out is unmatched in the history of mobility. We aim to alleviate much of the confusion and hostility by providing an overarching description and security document.

Read More
news image

The State of Ransomware 2022

whitePaper | April 20, 2022

Sophos' annual study of the real-world ransomware experiences of IT professionals working at the frontline has revealed an ever more challenging attack environment together with the growing financial and operational burden ransomware places on its victims. It also shines new light on the relationship between ransomware and cyber insurance, and the role insurance is playing in driving changes to cyber defenses.

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More

Spotlight

TechEase Computer Solutions, LLC

Offering computer and network support for small businesses and non-profits in Santa Barbara, TechEase is your personal IT department. Services include networking, security, server administration, end user support, spyware and virus infections, data recovery, laptop power jack repair, laptop lcd screen repair, remote access, disaster planning, software and hardware upgrades, maintenance and all other needs associated with business IT infrastructure.

Events