A critical, security vulnerability has been discovered with all Samsung Galaxy smartphones sold after late 2014. The issue is caused by a security gap when the devices handle .qmg images, such as thumbnails. It ranks as the highest threat level, a 10 on the CVSS scale, in terms of criticality and vulnerability. Your device could….

Budgetary Inefficiencies in IT Departments
The constraint of limited budgets resonates with IT departments across the globe and prevents them from executing more projects and providing more value for the business. There are two primary reasons that budgets are insufficient. First, the department budget is determined by someone other than the IT department and results in an insufficient amount. Second,….

Advanticom Advisory – VMware Issue
Critical VMware Vulnerability VMware just released a CVSS 10 (critical) vulnerability for VMware vCenter 6.7 and VCSA 6.7. It ONLY impacts environments that were upgraded from previous versions including Version 6.7, 6.5, and older. Version 7.0 is not affected. VMware corrected the issue in vCenter/VCSA 6.7 update 3F, which was released on 4/10/20. This vulnerability….

COVID-19 Resources
Business and Leadership Framework The international, corporate, and individual experiences of the COVID-19 crisis are unique. While analogies have been drawn to the 1918 flu and seasonal flu, it is the experience and the complete change of life that makes this unlike any human experience seen before. Businesses have been faced with an abrupt change….

Are You Equipped to Handle a Security Breach?
Breach. Threat. Attack. These words are commonplace in the IT world today. Thankfully, the cybersecurity industry is fighting back with tactics in prevention, detection, and mitigation. Cybersecurity has become a common conversation for IT departments. It is forcing companies to face the reality of cybersecurity and how they are going to protect their intellectual property,….