In the previous decade, the rise of shadow IT, characterized by the use of unsanctioned cloud applications, became a major concern within organizations due to the proliferation of free and inexpensive cloud-based tools. Now ten years later, we are witnessing an explosion in Generative AI (GenAI),
SECURITY BULLETIN: Cisco Duo Authentication for Windows Logon and RDP Information Vulnerability (CVE-2024-20292)
Last October, Cisco announced a security vulnerability in their Duo Authentication for Windows Logon and RDP that impacted releases 4.0 through 4.2. In April, Cisco delivered a new release and a fix for CVE-2024-20292.
Systems Engineering is aware of three Vulnerabilities affecting the Cisco ASA; Cisco Adaptive Security Appliance Web Service Denial of Service Vulnerability - CVE-2024-20353, Cisco Adaptive Security Appliance Command Injection Vulnerability - CVE-2024-20358, and Cisco Adaptive Security Appliance Persistent Local Code Execution Vulnerability - CVE-2024-20359.
Imagine the impact on your organization in the event of an IT disaster like an office fire, systems failure, or ransomware attack. If all your data vanished, how quickly could your organization bounce back? Would it be a matter of minutes, hours, days, or even weeks? Consider the repercussions on your customers and employees. These are the critical data resiliency queries that business leaders must address when evaluating their data backup solutions and recovery strategies.
Systems Engineering is aware of two vulnerabilities, the Fortinet FortiClient EMS Pervasive SQL injection in DAS component (CVE-2023-48788) and FortiClient EMS - CSV injection in the log download feature (CVE-2023-47534).
The following is provided for reference purposes and to inform clients as to which versions of these common products are supported by the manufacturer and therefore covered under our service terms.
In today's digital landscape, the prevalence of remote work has led to an increasing reliance on employees' personal devices for various tasks. From sending emails to accessing applications and reviewing documents, the convenience of utilizing personal devices for business productivity actions has become commonplace. While this trend offers undeniable benefits in terms of flexibility and efficiency, it also introduces new risks to sensitive company data.