image effect swoosh

Our Blog

Person Holding Space Gray Iphone X 1440722

Advanticom Advisory – Samsung Alert

A critical, security vulnerability has been discovered with all Samsung Galaxy smartphones sold after late 2014. The issue is caused by a security gap when the devices handle .qmg images, such as thumbnails. It ranks as the highest threat level, a 10 on the CVSS scale, in terms of criticality and vulnerability. Your device could….

Read More

Man With Headphones Facing Computer Monitor 845451

Budgetary Inefficiencies in IT Departments

The constraint of limited budgets resonates with IT departments across the globe and prevents them from executing more projects and providing more value for the business.  There are two primary reasons that budgets are insufficient.  First, the department budget is determined by someone other than the IT department and results in an insufficient amount.  Second,….

Read More

Bandwidth Close Up Computer Connection 1148820

Advanticom Advisory – VMware Issue

Critical VMware Vulnerability VMware just released a CVSS 10 (critical) vulnerability for VMware vCenter 6.7 and VCSA 6.7.  It ONLY impacts environments that were upgraded from previous versions including Version 6.7, 6.5, and older. Version 7.0 is not affected. VMware corrected the issue in vCenter/VCSA 6.7 update 3F, which was released on 4/10/20.  This vulnerability….

Read More

Man Doing A Sample Test In The Laboratory 4033148

COVID-19 Resources

Business and Leadership Framework The international, corporate, and individual experiences of the COVID-19 crisis are unique.  While analogies have been drawn to the 1918 flu and seasonal flu, it is the experience and the complete change of life that makes this unlike any human experience seen before.  Businesses have been faced with an abrupt change….

Read More

Coding Computer Data

Are You Equipped to Handle a Security Breach?

Breach.  Threat.  Attack.   These words are commonplace in the IT world today. Thankfully, the cybersecurity industry is fighting back with tactics in prevention, detection, and mitigation. Cybersecurity has become a common conversation for IT departments.   It is forcing companies to face the reality of cybersecurity and how they are going to protect their intellectual property,….

Read More

Contact Us

Let us contact you about your upcoming project.

Let's Talk