Business
Focused
Technology

Attack of the third party programs

There are four primary “attack” vectors that allow viruses onto your computer: Internet Explorer, Flash, Acrobat Reader, and Java.  As of late, there have been many vulnerabilities associated with these programs and virus writers have been successful in exploiting them.
The best way to protect yourself is to make sure these programs are updated to the latest release and all old versions of the programs, java in particular, are removed.  There are a couple ways you can go about this.  First, run Windows updates.  This will take care of Internet Explorer updates.  Then go to each company’s website, download the latest release of the program, and install it.  Not too difficult –until you have to do this to more than 10 computers every week to keep up with the multiple updates that are published.
The right tool for the job is always important.  Enter Ninite (ninite.com).  This is a site that allows you to create a custom installer to install/update all of the above mentioned programs – plus more.   Run the installer on each computer to update the software to the latest release.  It works great and cuts down time spent updating each machine.  If you have many machines to update there is still a time commitment involved in running the installer on each computer.
IT360, Inc. routinely runs these updates each week and validates the successful install of the latest programs for those clients that are under our Managed IT Service plan.  Under this plan there is nothing more for you to do, and one less thing to worry about in your busy day.

Principal Owner, Law Firm

Our law firm uses IT360, Inc. for all of our technology needs. They not only provide outstanding service at a reasonable fee, but we consider them an integral part of our practice.

Principal Owner, Law Firm

Recent
Technology News

IT 360 News
Threats and Infrastructure

From Arctic Wolf SUMMARY On February 7, 2024, CISA issued an advisory detailing their discoveries concerning state-sponsored cyber actors linked to the People’s Republic of China (PRC). Notably, the PRC-affiliated threat actor, Volt Typhoon, is actively engaged in efforts to infiltrate IT networks, with the potential aim of launching cyberattacks on vital U.S. infrastructure in […]

Read more
IT 360 News
Multi-Factor Authentication

By Cybersecurity & Infrastructure Security Agency OVERVIEW Multi-factor authentication (MFA) is a layered approach to securing physical and logical access where a system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login. MFA increases security because even if one authenticator becomes compromised, unauthorized users […]

Read more