This month’s customer satisfaction score:98.76%

“Robin is professional and outstanding in her field. As customers, she always meets our needs — going above and beyond!!”

Zero Day Events & Application Control

What is a Zero-Day event and how do I prevent it?

A zero-day event is an attack that takes advantage of an unknown or unaddressed vulnerability. Many of the security tools we use depend on knowledge of existing threats to form a pattern that can be recognized as a threat. That is why zero-day threats are so concerning – we don’t know about
them yet.

Normally, all applications that have been permitted on a workstation or server are able to access all data that the user can access. This means if an application is compromised, the attacker can use the application to steal or encrypt files. So, bad actors will take advantage of trusted applications and leverage vulnerabilities in new ways to place malware on your network or steal data.

To prevent these attacks, ThreatLocker works by denying all applications except those that are explicitly allowed. The Allow List is made by running Threatlocker in your environment for two weeks. We analyze what comes back to determine a final list of safe applications that are running in your environment. Once this is done, untrusted software – including ransomware and other malware – will be denied by default. This approach stops not only malicious software, but also stops other unpermitted applications from running. New applications go through a verification process and are added to the Allow List.

Our primary goal is always your security and shielding you from bad actors. Application control with Threat locker is a great tool to add to your security arsenal.

Dell Data Breach

Last week it was revealed that a bad actor stole the information for approximately 49 million customers who purchased equipment from Dell between 2017-2024. While no financial information was stolen, names and addresses were part of the breach.

With this information, bad actors could target people with physical mailings. They might include phishing links or prompts to install malware on your devices (a similar scam on Best Buy customers is pictured to the right).

Be wary of any physical mailings or emails you receive that claim to be from Dell asking you to install software, change passwords, or perform other potentially risky actions.

As always, we encourage you to reach out to our Help Desk with anything you find suspicious!