Blog

Dresner Group Blog

Our technology blogs feature IT tips and best practices for businesses in Columbia, Baltimore, Bel Air and in and about Maryland since 2002.

Whoops! Microsoft Update Has Been Missing This Critical Security Vulnerability

Whoops! Microsoft Update Has Been Missing This Critical Security Vulnerability

For the most part, Microsoft takes security as seriously as it should, issuing updates and patches to maintain your Windows and Server operating systems. While you can count on receiving these updates for your supported operating systems, what you might not have known is that Microsoft accidentally overlooked a flaw in its own defenses.

0 Comments
Continue reading

These Are the Ways You Get Malware

These Are the Ways You Get Malware

Malware has been a problem for people that rely on technology for decades. Like the security that is designed to mitigate the effect of malware, the malware itself has grown in potency and frequency and is a major problem for businesses. Today, we will take a look at a few ways you can get malware. 

0 Comments
Continue reading

Ransomware Has Gone Mobile

Ransomware Has Gone Mobile

Smartphones have managed to hold out against ransomware a bit longer than other hardware and operating systems, but those days are coming to an end. It’s important to remember that the average smartphone is not protected with antivirus software and thus remains threatened by your standard ransomware attacks. It is absolutely critical that your business doubles down on its protection against ransomware, especially in the mobile market.

0 Comments
Continue reading

Top Cybersecurity Definitions that Maryland Businesses Need to Know

Top Cybersecurity Definitions that Maryland Businesses Need to Know

Cybersecurity needs to be taken seriously. Cyberthreats can cause serious damage to an organization in the form of lost revenue, lost data, damage to your public image, lawsuits, and more. It helps to understand what you are up against, so let’s define some of the most common types of threats that you need to be aware of.

0 Comments
Continue reading

Is Your Organization Putting Efforts into Preventing Cyberattacks?

cybersecurity

At the beginning of this year, Governor Larry Hogan approved $16 million in capital grants, distributed amongst 13 agreements. These grants were earmarked to benefit a variety of public facilities, from community centers to medical support and treatment centers, amongst others. 

While we recognize this as a great thing for the people of Maryland, we can’t help but hope that some of these funds are going to be used by the recipients to lock down their cybersecurity.

0 Comments
Continue reading

What Businesses Can Learn from the Maryland Department of Health Ransomware Attack

What Businesses Can Learn from the Maryland Department of Health Ransomware Attack

Back in December of 2021, the Maryland Department of Health suffered a ransomware attack that rendered quite a few services unavailable. Let’s take a few moments to look back at this attack to see what can be learned from it.

0 Comments
Continue reading

There is No Value in Paying a Ransom

There is No Value in Paying a Ransom

We all know at this point how dangerous ransomware can be for businesses. It can lock down files, threaten operational continuity, and in some cases subject victims to brutal fines as a result of privacy breaches. One place where you might not expect ransomware to hit, however, is customer reviews, and it all stems from the big question: do you pay to resolve a ransomware attack or not?

0 Comments
Continue reading

Malware is Everywhere. Even Your Ads

Malware is Everywhere. Even Your Ads

Do you ever see an advertisement for a free download of a popular Windows application and think, “Wow, this sure sounds too good to be true!”? Well, it most definitely is, and hackers use these malvertisements to infect computers with malware and other threats. Specifically, malvertising is used to download three different types of malware, all of which can cause harm to unwary businesses.

0 Comments
Continue reading

Let’s Look at Some of the Virtual Threats

Let’s Look at Some of the Virtual Threats

Network security is challenging for many businesses, and it’s largely because of the large number of various threats that populate the Internet. Some companies simply don’t know what the correct measures to take are, leaving themselves vulnerable to these threats on both a security standpoint and an employee training standpoint. We’ll delve into some of these threats and how they can be addressed.

0 Comments
Continue reading

ALERT: Update Your iPhone, iPad, Apple Watch, and Mac NOW.

ALERT: Update Your iPhone, iPad, Apple Watch, and Mac NOW.

If you use almost any Apple products, you’ll want to check for and apply an update that will prevent your devices from being spied on. Apple has just issued an emergency software update for a critical vulnerability that was recently discovered.

The new updates were pushed out on Monday, September 13th, 2021, and include a major security fix for the Apple iPhone, Apple iPad, Apple Watch, and Apple Mac computers and laptops.

0 Comments
Continue reading

Read This if You Don’t Believe That Ransomware is a Major Problem for Businesses Like Yours

Read This if You Don’t Believe That Ransomware is a Major Problem for Businesses Like Yours

You’d think that cybercriminals would use ransomware to target high-profile businesses with loads of money to extort, but this is not always the case. Even a small business can fall victim to these particularly devastating threats. Ransomware, just like other threats out there, has continued to evolve and adjust its approaches based on the current cybersecurity climate, so what are some of the latest developments in ransomware?

0 Comments
Continue reading

Don’t Be Caught Off Guard by Ransomware

Don’t Be Caught Off Guard by Ransomware

Ransomware is bad stuff, and it’s only gotten worse with its recent resurgence that aligned with the COVID-19 pandemic. Phishing attacks and other means by which ransomware is commonly spread have used the current atmosphere as a springboard. This makes it even more critical that these kinds of behaviors and attempts can be spotted and stopped.

0 Comments
Continue reading

The Key to Protecting Your Business from Ransomware Is More of the Same

The Key to Protecting Your Business from Ransomware Is More of the Same

With so many high-profile ransomware attacks being launched against manufacturers, pipelines, and even hospitals, it’s no surprise that many companies are worried about what the future of this threat means for their organizations. Ransomware poses a serious threat, one that cannot possibly be ignored, so we urge you to take action now so you don’t come to regret it later.

0 Comments
Continue reading

Agent Tesla Is Out to Steal Your Credentials (and Your Cryptocurrency)

Agent Tesla Is Out to Steal Your Credentials (and Your Cryptocurrency)

Network security isn’t just for large, high-profile enterprises; even small businesses need to take it seriously. All businesses have something of value to hackers, and if you don’t believe this is the case for your organization, think again. All data is valuable to hackers, and you need to do everything in your power to protect it—especially against threats like Agent Tesla, the latest version of phishing malware designed to steal your data.

0 Comments
Continue reading

How Can a Business Be Impacted by Unpatched Software?

How Can a Business Be Impacted by Unpatched Software?

It’s no secret that software often does not work as intended. Developers frequently discover bugs and patch them out. The same can be said for security vulnerabilities. Despite the importance of these updates, small businesses often fail to implement these patches and updates in a timely manner, a practice which can lead to more problems down the road.

0 Comments
Continue reading

The Colonial Pipeline Attack Continues to Be Important to Cybersecurity

The Colonial Pipeline Attack Continues to Be Important to Cybersecurity

The situation surrounding the hack against Colonial Pipeline has only become more complex as new information has come to light, each new discovery providing more insights and potentially actionable takeaways. Let’s examine some of the biggest developments surrounding the attack, and what they will likely mean for overall cybersecurity from this point forward.

0 Comments
Continue reading

How Many Types of Cybercriminals Can You Name?

How Many Types of Cybercriminals Can You Name?

We’re all familiar with the idea that pop culture has cultivated in our minds about computer hackers, but as it happens, this impression is just one of the many shapes that the modern hacker can take. This kind of closed-off view is dangerously shortsighted, so let’s take a few moments to dig into the kinds of hackers there are, in ascending order of the threat they pose to your business.

0 Comments
Continue reading

Tip of the Week: Warning Signs of a Mobile Malware Infection

Tip of the Week: Warning Signs of a Mobile Malware Infection

If you’re the average business user today, you probably rely on a smartphone to manage much of your life, both personally and in the professional sense. As our phones have become so central to our lives, hackers now have the opportunity to attack through malicious applications. For this week’s tip, we wanted to go over a few ways to tell that an app might be an attack in disguise.

0 Comments
Continue reading

Are Macs Inherently More Secure than PCs?

Are Macs Inherently More Secure than PCs?

It has long been assumed that computer viruses are a Windows operating system exclusive, that Macs are immune from these issues. Let’s examine the validity of these assumptions, and how much you need to be invested in your technology’s protections.

0 Comments
Continue reading

Four Security Tips Your Entire Staff Should Know

Four Security Tips Your Entire Staff Should Know

While investing in cybersecurity solutions like firewalls, backup, and monitoring are essential to protecting your data from being compromised, focusing solely on technology is only half the battle. The greatest vulnerability will always be the employee. In order to protect your data, you need to give your employees the training to protect themselves. After all, when it comes to network security, your team is your critical asset. Here are four security lessons your team needs to know.

0 Comments
Continue reading

Client Service Login

Latest News & Events

This tournament is scheduled to be held Friday, June 10, 2022. The past six years have all been sold-out and this year is shaping up to be another one for the books you won't want to miss. 

Contact Us

Learn more about what Dresner Group can do for your business.

  • (410) 531-6727
  • 8600 Foundry Street, Suite 302, Savage, Maryland 20763

Copyright Dresner Group. All Rights Reserved.