<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Alert Archives - Aditi Group Managed IT &amp; Consulting</title>
	<atom:link href="https://aditigroup.com/category/security-alert/feed/" rel="self" type="application/rss+xml" />
	<link>https://aditigroup.com/category/security-alert/</link>
	<description>IT Privacy • Protection • Productivity</description>
	<lastBuildDate>Wed, 10 Apr 2024 20:27:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://aditigroup.com/data-privacy/wp-content/uploads/cropped-aditi-group-icon-512-t-32x32.png</url>
	<title>Security Alert Archives - Aditi Group Managed IT &amp; Consulting</title>
	<link>https://aditigroup.com/category/security-alert/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What&#8217;s the Score? National Vulnerability Database</title>
		<link>https://aditigroup.com/whats-the-score-national-vulnerability-database/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 20:27:26 +0000</pubDate>
				<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Security Learning]]></category>
		<category><![CDATA[National Institute of Standards and Technology]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[NVD]]></category>
		<category><![CDATA[rating]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[severity]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1137</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Weakness Scoring System</h2>
<p>Our Federal government division witin the Department of Commerce, under the National Institute of Standards and Technology, NIST, has a <strong>National Vulnerability Databaase</strong> designed to help the public, and especially the technical administrators of IT systems to guage potential weaknesses or vulnerabilities in software and hardware systems.  </p>
<p>&nbsp;</p></div>
			</div><div class="et_pb_module et_pb_image et_pb_image_0">
				
				
				
				
				<a href="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" class="et_pb_lightbox_image" title="NATIONAL VULNERABILITY DATABASE"><span class="et_pb_image_wrap "><img fetchpriority="high" decoding="async" width="2400" height="1350" src="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png" alt="NATIONAL VULNERABILITY DATABASE" title="NIST-national-vulnerability-database page-2400" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400.png 2400w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-1280x720.png 1280w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-980x551.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/NIST-national-vulnerability-database-page-2400-480x270.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 2400px, 100vw" class="wp-image-1139" /></span></a>
			</div><div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>NIST has been working with private industry and other public sector organizations to rate and maintain a catalog of IT threats.   Originally started in 1999 under another name, and as an effort between NIST, SANS institute, and othrs, under the name ICAT or Internet Category Attack Toolkit.  It evolved and even faced death by lack of budgets until rebranded as NVD in 2005 and supported more fully.  </p></div>
			</div><div class="et_pb_module et_pb_blurb et_pb_blurb_0  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img decoding="async" width="1199" height="873" src="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png" alt="example NVD score 7.8" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938.png 1199w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-980x714.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/example-NVD-CVE-2021-46938-480x349.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1199px, 100vw" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1145" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>Example: 7.8 Severity Linux Vulnerability</span></h4>
						<div class="et_pb_blurb_description"><p>This page is an excellent example of the use, and also of how technical it is.  <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-46936">https://nvd.nist.gov/vuln/detail/CVE-2021-46936</a></p></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/whats-the-score-national-vulnerability-database/">What&#8217;s the Score? National Vulnerability Database</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Watch Your Keys &#8211; YubiKey Manager Advisory</title>
		<link>https://aditigroup.com/watch-your-keys-yubikey-manager-advisory/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 10 Apr 2024 19:37:17 +0000</pubDate>
				<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[hardware key]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[two factor authentication]]></category>
		<category><![CDATA[Yubico]]></category>
		<category><![CDATA[YubiKey]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=1125</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/watch-your-keys-yubikey-manager-advisory/">Watch Your Keys &#8211; YubiKey Manager Advisory</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Security Advisory</h2>
<p>Yubico, maker of YubiKeys, issued this advisory of vulnerabilities in their software application YubiKey Manager GUI  <a href="https://www.yubico.com/support/security-advisories/ysa-2024-01/">https://www.yubico.com/support/security-advisories/ysa-2024-01/</a></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_1_2 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>WHO DOES THIS AFFECT?</h2>
<h3>Keys are Good.  Program has vulnerability.</h3>
<h4>Only users of <span><strong>YubiKey Manager GUI <span style="color: #ff0000;"><em>versions perior to 1.2.6</em></span></strong> installed on a computer that is running Windows and is not using Edge as the default browser. </span></h4>
<p>Millions of people worldwide use YubiKeys for more secure multifactor authentication than the common SMS text message, email or phone call.  It is also an alternative or adjunct to authenticator apps which are found on phones &#8211; like Google Authenticator, and apps from password managers like 1PAssword, Dashlane, and LastPass.   YubiKeys and other hardware keys are generally more secure than using phones or emails as those accounts can be compromised or hijacked remotely.  Physical keys are difficult to copy, clone, or interecpt.</p></div>
			</div>
			</div><div class="et_pb_column et_pb_column_1_2 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				
				
				<div class="et_pb_text_inner"><h3 class="wp-block-heading">HOW SCARY IS THIS?</h3>
<h3 class="wp-block-heading" id="h-severity">Severity</h3>
<h4>Yubico has rated this issue as High. It has a CVSS score of<span> </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H&amp;version=3.1" target="_blank" rel="noreferrer noopener">7.7</a>.</h4></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_dark">
				
				
				
				
				<div class="et_pb_text_inner"><h2><span>SOLUTION</span></h2>
<h4><span>Download the latest version of YubiKey Manager GUI from </span><a href="https://www.yubico.com/support/download/yubikey-manager/">Yubico.com website</a><span> or </span><a href="https://github.com/Yubico/yubikey-manager-qt" target="_blank" rel="noreferrer noopener">directly from GitHub</a><span>.</span></h4></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Bottomline</h2>
<p>Update Software.  Keep using advanced security options like hardware MFA tools.</p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_blurb et_pb_blurb_1  et_pb_text_align_left et_pb_blurb_position_top et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_blurb_content">
					<div class="et_pb_main_blurb_image"><span class="et_pb_image_wrap et_pb_only_image_mode_wrap"><img decoding="async" width="300" height="80" src="https://aditigroup.com/data-privacy/wp-content/uploads/partner-logo-yubico_2x-2798497557-300x80.png" alt="yubico MFA security key" class="et-waypoint et_pb_animation_top et_pb_animation_top_tablet et_pb_animation_top_phone wp-image-1129" /></span></div>
					<div class="et_pb_blurb_container">
						<h4 class="et_pb_module_header"><span>Advisory April 4, 2024</span></h4>
						<div class="et_pb_blurb_description"><h3 class="wp-block-heading" id="h-summary">Summary</h3>
<p>A security issue has been identified in YubiKey Manager GUI which could lead to unexpected privilege escalation on Windows. If a user runs the YubiKey Manager GUI as Administrator, browser windows opened by YubiKey Manager GUI may be opened as Administrator which could be exploited by a local attacker to perform actions as Administrator. Under this circumstance, some browsers like Edge for example, have additional mitigations to prevent opening as Administrator.</p>
<h3 class="wp-block-heading" id="h-affected-software">Affected software</h3>
<p>The affected tool is YubiKey Manager GUI (commonly known as<span> </span><em>ykman-gui</em>) with versions prior to 1.2.6. The issue impacts installations on Windows because Windows requires Administrative permissions to interact with FIDO authenticators. For other operating systems, YubiKey Manager GUI should not be run with elevated permissions.</p>
<h3 class="wp-block-heading" id="h-not-affected-software">Not affected software</h3>
<p>Installations of YubiKey Manager GUI on platforms other than Windows are not impacted by this issue.</p>
<h3 class="wp-block-heading" id="h-how-to-tell-if-you-are-affected">How to tell if you are affected</h3>
<p>You are affected if you have YubiKey Manager GUI versions &lt; 1.2.6 installed on a computer that is running Windows and is not using Edge as the default browser. You can check the version of YubiKey Manager GUI you have installed by clicking the “About” menu in the YubiKey Manager GUI.</p>
<h3 class="wp-block-heading" id="h-customer-actions">Customer Actions</h3>
<p>Yubico recommends that affected customers update to the latest version of YubiKey Manager available for download from<span> </span><a href="https://www.yubico.com/support/download/yubikey-manager/">our website</a><span> </span>or<span> </span><a href="https://github.com/Yubico/yubikey-manager-qt" target="_blank" rel="noreferrer noopener">directly from GitHub</a>.</p>
<h4 class="wp-block-heading" id="h-alternate-mitigations">Alternate Mitigations</h4>
<ol>
<li>Running YubiKey Manager GUI elevated is only required for using the FIDO features. In cases where users do not require FIDO features in YubiKey Manager GUI, it can run as an unelevated user to avoid this issue.</li>
<li>Users can set Microsoft Edge as their default browser which includes mitigations to avoid inheriting Administrative permissions when opened in this way.</li>
</ol>
<h3 class="wp-block-heading" id="h-issue-details">Issue Details</h3>
<p>YubiKey Manager GUI is a tool for managing the various features of a YubiKey, including FIDO, OTP or PIV. In certain situations, the tool spawns the system default browser as a child process. This action requires user interaction with the tool and is not automatically triggered.</p>
<p>On Windows systems, the ability to communicate with FIDO authenticators requires Administrator privileges. This is a limitation built into the operating system by Microsoft. Thus, in order to interact with the FIDO functionality of the YubiKey, the user must run YubiKey Manager GUI with Administrator privileges. Once YubiKey Manager GUI is run with Administrator privileges, any browser windows opened by YubiKey Manager GUI may also be elevated with Administrator privileges depending on the browser in use. This issue can be used by an attacker to escalate local attacks and increase the impact of browser based attacks.</p>
<h3 class="wp-block-heading" id="h-severity">Severity</h3>
<p>Yubico has rated this issue as High. It has a CVSS score of<span> </span><a href="https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H&amp;version=3.1" target="_blank" rel="noreferrer noopener">7.7</a>.</p>
<h3 class="wp-block-heading" id="h-timeline"><strong>Timeline</strong></h3>
<figure class="wp-block-table">
<table>
<tbody>
<tr>
<td>February 1, 2024</td>
<td>Issue identified</td>
</tr>
<tr>
<td>April 4, 2024</td>
<td>Yubico releases advisory</td>
</tr>
</tbody>
</table>
</figure></div>
					</div>
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/watch-your-keys-yubikey-manager-advisory/">Watch Your Keys &#8211; YubiKey Manager Advisory</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S1E2 &#8211; Talking Brass Tax, 2021 Money Scams, and Advice with Finance Veteran Kevin Thompson</title>
		<link>https://aditigroup.com/s1e2-talking-brass-tax-2021-money-scams-and-advice-with-finance-veteran-kevin-thompson/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Fri, 07 May 2021 17:34:06 +0000</pubDate>
				<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Califorina stimulus scam]]></category>
		<category><![CDATA[CPA]]></category>
		<category><![CDATA[Cyber Gurus]]></category>
		<category><![CDATA[fraudulent filings]]></category>
		<category><![CDATA[identity theft]]></category>
		<category><![CDATA[IRS Tax scam]]></category>
		<category><![CDATA[IRS warnings]]></category>
		<category><![CDATA[Kevin Thompson]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[Tax accounting]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=620</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/s1e2-talking-brass-tax-2021-money-scams-and-advice-with-finance-veteran-kevin-thompson/">S1E2 &#8211; Talking Brass Tax, 2021 Money Scams, and Advice with Finance Veteran Kevin Thompson</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_1">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="1000" height="1000" src="https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e2-2021-tax-scams-fraud-and-advice-kevin-thompson.png" alt="Cyber Gurus podcast tax, SBA and stinulus fraud" title="cyber-gurus-podcast-s1e2-2021-tax-scams-fraud-and-advice-kevin-thompson" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e2-2021-tax-scams-fraud-and-advice-kevin-thompson.png 1000w, https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e2-2021-tax-scams-fraud-and-advice-kevin-thompson-980x980.png 980w, https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e2-2021-tax-scams-fraud-and-advice-kevin-thompson-480x480.png 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) 1000px, 100vw" class="wp-image-662" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Special guest Kevin Thompson, CPA, a 45-year veteran in accounting and tax preparation, tells us about 2021 tax fraud and scams, credit fraud, identity theft, ghost tax preparers, SBA loan and stimulus check scams. He&#8217;ll also explain what to do if you&#8217;re the victim of IRS tax fraud and valuable steps you can take to protect yourself. Cyber Gurus podcast hosts Ted Flittner and Ted Mayeshiba of Aditi Group bring this lively and valuable happy hour session to protect your money.</p>
<p><strong style="margin: 0px;padding: 0px;border: 0px;font-size: 14px;vertical-align: baseline;background: #ffffff;font-weight: bold;color: #666666;font-family: 'Open Sans', Arial, sans-serif;font-style: normal;letter-spacing: normal;text-align: left;text-indent: 0px;text-transform: none">Press the ARROW on the player below to listen now</strong></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_0">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/cybergurus/embed/episodes/S1E2---Talking-Brass-Tax--2021-Money-Scams--and-Advice-with-Finance-Veteran-Kevin-Thompson-e10qmo0" height="153px" width="600px" frameborder="0" scrolling="no"></iframe></div>
			</div><div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="chb9c-0-0">
<h3 data-offset-key="chb9c-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr">Show Notes</h3>
<div data-offset-key="chb9c-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="chb9c-0-0" style="font-weight: bold"><span data-text="true"></span></span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="evvgb-0-0">
<div data-offset-key="evvgb-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="evvgb-0-0" style="font-weight: bold"><span data-text="true">IRS 5071 C letter</span></span><span data-offset-key="evvgb-0-1"> &#8211; Identity theft letter. This is how the IRS will tell you that you&#8217;re a victim of Tax Fraud</span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="dlf1j-0-0">
<div data-offset-key="dlf1j-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><a href="https://www.irs.gov/individuals/understanding-your-letter-5071c-or-6331c"><span data-offset-key="dlf1j-0-0">https://www.irs.gov/individuals/understanding-your-letter-5071c-or-6331c</span></a></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="2u1k1-0-0">
<div data-offset-key="2u1k1-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="2u1k1-0-0"> </span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="dhjpk-0-0">
<div data-offset-key="dhjpk-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="dhjpk-0-0" style="font-weight: bold"><span data-text="true">IRS Fraud targeting gift cards</span></span><span data-offset-key="dhjpk-0-1"> &#8211; Watch a short video</span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="60nm4-0-0">
<div data-offset-key="60nm4-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><a href="https://youtu.be/Z9yRuyXt9vQ"><span data-offset-key="60nm4-0-0">https://youtu.be/Z9yRuyXt9vQ</span></a></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="dhupt-0-0">
<div data-offset-key="dhupt-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="dhupt-0-0"> </span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="cf0rg-0-0">
<div data-offset-key="cf0rg-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="cf0rg-0-0" style="font-weight: bold"><span data-text="true">California State Abandoned Property</span></span><span data-offset-key="cf0rg-0-1"> &#8211; one of many websites for check whether property in your name can be claimed</span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="dn6of-0-0">
<div data-offset-key="dn6of-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><a href="https://www.sco.ca.gov/upd_msg.html"><span data-offset-key="dn6of-0-0">https://www.sco.ca.gov/upd_msg.html</span></a></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="41qpq-0-0">
<div data-offset-key="41qpq-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="41qpq-0-0"> </span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="10o5q-0-0">
<div data-offset-key="10o5q-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="10o5q-0-0" style="font-weight: bold"><span data-text="true">Identity Protection Pins</span></span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="95lm-0-0">
<div data-offset-key="95lm-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><a href="https://www.irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin"><span data-offset-key="95lm-0-0">https://www.irs.gov/identity-theft-fraud-scams/get-an-identity-protection-pin</span></a></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="du9gi-0-0">
<div data-offset-key="du9gi-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="du9gi-0-0">Where Apply for your PIN</span></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="fhndt-0-0">
<div data-offset-key="fhndt-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><a href="https://sa1.www4.irs.gov/icce-core/loac/ippin/pages/ippin.xhtml"><span data-offset-key="fhndt-0-0">https://sa1.www4.irs.gov/icce-core/loac/ippin/pages/ippin.xhtml</span></a></div>
</div>
<div class="DK2WGA7X3rKos2v1AABBD _20x9t-BL2SDh7lOGEew66E" data-block="true" data-editor="aqbol" data-offset-key="for0h-0-0">
<div data-offset-key="for0h-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="for0h-0-0">Please have the following information and materials to complete registration:</span></div>
</div>
<ul class="public-DraftStyleDefault-ul" data-offset-key="37dsr-0-0">
<li class="DK2WGA7X3rKos2v1AABBD public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-reset public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="aqbol" data-offset-key="37dsr-0-0">
<div data-offset-key="37dsr-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="37dsr-0-0">    Full Name</span></div>
</li>
<li class="DK2WGA7X3rKos2v1AABBD public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="aqbol" data-offset-key="361ap-0-0">
<div data-offset-key="361ap-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="361ap-0-0">    Email</span></div>
</li>
<li class="DK2WGA7X3rKos2v1AABBD public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="aqbol" data-offset-key="fr5ss-0-0">
<div data-offset-key="fr5ss-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="fr5ss-0-0">    Birthdate</span></div>
</li>
<li class="DK2WGA7X3rKos2v1AABBD public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="aqbol" data-offset-key="24odi-0-0">
<div data-offset-key="24odi-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="24odi-0-0">    Social Security Number (SSN) or Individual Tax Identification Number (ITIN)</span></div>
</li>
<li class="DK2WGA7X3rKos2v1AABBD public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="aqbol" data-offset-key="6drft-0-0">
<div data-offset-key="6drft-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="6drft-0-0">    Tax filing status</span></div>
</li>
<li class="DK2WGA7X3rKos2v1AABBD public-DraftStyleDefault-unorderedListItem public-DraftStyleDefault-depth0 public-DraftStyleDefault-listLTR" data-block="true" data-editor="aqbol" data-offset-key="9rbpa-0-0">
<div data-offset-key="9rbpa-0-0" class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"><span data-offset-key="9rbpa-0-0">    Current address</span></div>
</li>
</ul></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/s1e2-talking-brass-tax-2021-money-scams-and-advice-with-finance-veteran-kevin-thompson/">S1E2 &#8211; Talking Brass Tax, 2021 Money Scams, and Advice with Finance Veteran Kevin Thompson</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</title>
		<link>https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/</link>
		
		<dc:creator><![CDATA[Cyber Guru]]></dc:creator>
		<pubDate>Sat, 13 Mar 2021 19:43:50 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Podcast]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Coors]]></category>
		<category><![CDATA[Cyber Gurus]]></category>
		<category><![CDATA[data backup]]></category>
		<category><![CDATA[email hack]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Microsoft Exchange]]></category>
		<category><![CDATA[podcast]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[risk assessment]]></category>
		<category><![CDATA[verification]]></category>
		<category><![CDATA[wifi security]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=629</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/">S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_image et_pb_image_2">
				
				
				
				
				<span class="et_pb_image_wrap "><img loading="lazy" decoding="async" width="600" height="591" src="https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft.jpg" alt="Cyber Gurus podcast Not So Happy Hour at Coors and Microsoft" title="cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft" srcset="https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft.jpg 600w, https://aditigroup.com/data-privacy/wp-content/uploads/cyber-gurus-podcast-s1e1-not-so-happy-hour-at-coors-and-microsoft-480x473.jpg 480w" sizes="(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw" class="wp-image-650" /></span>
			</div><div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>In this episode cyber security experts from Aditi Group tell us about why things are not Golden at Coors this week. And you&#8217;ll learn about the hack that is sweeping the planet with Microsoft Exchange. This first Friday Happy Hour edition podcast uncovers network security issues at Molsen-Golden that have had big impact on the taps and the company bottom line. We&#8217;ll talk data backups, ransomware, cyber hacks and more as we also cover the Microsoft global vulnerability that has already affected tens of thousands of servers. Join us to hear about these stories and how they relate to you and your precious electronic data.</p>
<p><strong>Press the ARROW on the player below to listen now</strong></p></div>
			</div><div class="et_pb_module et_pb_code et_pb_code_1">
				
				
				
				
				<div class="et_pb_code_inner"><iframe loading="lazy" src="https://anchor.fm/cybergurus/embed/episodes/S1E1---Friday-Happy-Hour---Not-to-Happy-at-Coors-et2bln" height="102px" width="600px" frameborder="0" scrolling="no"></iframe></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p>The post <a href="https://aditigroup.com/s1e1-friday-happy-hour-not-to-happy-at-coors/">S1E1 &#8211; Not So Happy Hour at Coors and Microsoft</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Does HIPAA Still Apply with Work at Home and COVID-19?</title>
		<link>https://aditigroup.com/does-hipaa-still-apply-with-work-at-home-and-covid-19/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Mon, 27 Apr 2020 21:29:36 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[coronavirus]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[HHS]]></category>
		<category><![CDATA[HIPAA breach]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[phone calls]]></category>
		<category><![CDATA[secure email]]></category>
		<category><![CDATA[sms]]></category>
		<category><![CDATA[text message]]></category>
		<category><![CDATA[waiver]]></category>
		<category><![CDATA[Zoom]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=431</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/does-hipaa-still-apply-with-work-at-home-and-covid-19/">Does HIPAA Still Apply with Work at Home and COVID-19?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
								<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_10  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>City, State, and Federal agencies have variously required or advised that offices should be closed and workers have transitioned to work in their own homes.  Does this mean that HIPAA requirements no longer apply?  This is an emergency situation right?  Surely some of the rules don&#8217;t apply now.</p>



<h2 class="wp-block-heading">Limited Waiver</h2>



<p>The Department of Health and Human Services announced with a special bulletin that a limited waiver is in place. Does it release all business associates and covered entities from HIPAA rules? </p>



<p><a href="https://www.hhs.gov/sites/default/files/hipaa-and-covid-19-limited-hipaa-waiver-bulletin-508.pdf">https://www.hhs.gov/sites/default/files/hipaa-and-covid-19-limited-hipaa-waiver-bulletin-508.pdf</a></p>



<h2 class="wp-block-heading">Safeguarding Patient Information</h2>



<p>In an emergency situation, covered entities must continue to implement reasonable safeguards to protect patient information against intentional or unintentional impermissible uses and disclosures. Further, covered entities (and their business associates) must apply the administrative, physical, and technical safeguards of the HIPAA Security Rule to electronic protected health information.</p>



<h2 class="wp-block-heading">Securing Communictions</h2>



<p>HHS says that covered entities and BAs are still responsible for secure communications.  Email, phone calls, text messaging are often used in unsecure ways.  Remember, when you&#8217;re working at home, you still need to use private and HIPAA compliant electronic communication methods to converse with patients or other associates and agencies.   </p>



<p>So, keep it secure with DATA and your health!</p></div>
			</div>
			</div>			
				
				
				
				
			</div>		
				
				
			</div><p>The post <a href="https://aditigroup.com/does-hipaa-still-apply-with-work-at-home-and-covid-19/">Does HIPAA Still Apply with Work at Home and COVID-19?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>OCR Imposters &#8211; Office for Civil Rights Investigators, Are They Real?</title>
		<link>https://aditigroup.com/ocr-imposters-office-for-civil-rights-investigators-are-they-real/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Sat, 04 Apr 2020 20:09:01 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[HIPAA]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[Health and Human Services]]></category>
		<category><![CDATA[HHS]]></category>
		<category><![CDATA[HIPAA violations]]></category>
		<category><![CDATA[imposters]]></category>
		<category><![CDATA[Investigators]]></category>
		<category><![CDATA[OCR]]></category>
		<category><![CDATA[Office for Civil Rights]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=407</guid>

					<description><![CDATA[<p>Thieves Are Hitting People in Times of Stress HHS has published several warnings recently, including this statement on April 3rd, that businesses should be ever vigilant against imposters posing as HHS / OCR investigators. April 3, 2020 Alert: Individual Posing as OCR Investigator It has come to OCR’s attention that an individual posing as an [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/ocr-imposters-office-for-civil-rights-investigators-are-they-real/">OCR Imposters &#8211; Office for Civil Rights Investigators, Are They Real?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Thieves Are Hitting People in Times of Stress</h3>



<p>HHS has published several warnings recently, including this statement on April 3rd, that businesses should be ever vigilant against imposters posing as HHS / OCR investigators. <br></p>



<div class="wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex">
<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:8%"></div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:84%">
<p><strong>April 3, 2020</strong></p>



<p><strong>Alert: Individual Posing as OCR Investigator</strong></p>



<p>It has come to OCR’s attention that an individual posing as an OCR Investigator has contacted HIPAA covered entities in an attempt to obtain protected health information (PHI).&nbsp; The individual identifies themselves on the telephone as an OCR investigator, but does not provide an OCR complaint transaction number or any other verifiable information relating to an OCR investigation.&nbsp;</p>



<p>HIPAA covered entities and business associates should alert their workforce members, and can take action to verify that someone is an OCR investigator by asking for the investigator’s email address, which will end in @hhs.gov, and asking for a confirming email from the OCR investigator’s hhs.gov email address.&nbsp; If organizations have additional questions or concerns, please send an email to: <a href="mailto:OCRMail@hhs.gov">OCRMail@hhs.gov</a>.</p>



<p>Suspected incidents of individuals posing as federal law enforcement should be reported to the Federal Bureau of Investigation (FBI).&nbsp; The FBI issued a public service announcement about COVID-19 fraud schemes at:</p>



<p><a href="https://www.ic3.gov/media/2020/200320.aspx.">https://www.ic3.gov/media/2020/200320.aspx.</a></p>
</div>



<div class="wp-block-column is-layout-flow wp-block-column-is-layout-flow" style="flex-basis:8%"></div>
</div>



<h2 class="wp-block-heading">Why Are People Posing As HHS Investigators?</h2>



<h3 class="wp-block-heading">HIPAA Spells Fear</h3>



<p>For most people who fall under the auspices of the Health Insurance Portability and Accountability Act, aka HIPAA, the terms instill a dread of burdensome policies and obscure reference documents and of punishment for failure to meet the rules.  HIPAA penalties include massive potential monetary fines.  In the most extreme cases, there is no legal dollar cap.   And perhaps worse for individuals, the potential for jail time for violation.  </p>



<h3 class="wp-block-heading">Scams Operate on Fear</h3>



<p>Many scam artists take advantage of fears that people may have.  The IRS, FBI, or now, HHS / OCR is calling.   When people are stressed or afraid, they often divulge information that they otherwise would keep private.  The scammer questions tend to follow the line of creating the panic or stress, then requesting info from people &#8211; your name, account numbers, social security numbers, etc.  These bits of data are the keys they want.  These are the keys to create false identities, credit fraud, or simply to hack into online accounts and ultimately bigger prizes.</p>



<h2 class="wp-block-heading">Stay Calm, Stay Professional</h2>



<p>Investigators from any government agency don&#8217;t need to pressure people.  They don&#8217;t need to and don&#8217;t tend to rush.  If they are ever investigating a case, they are careful, diligent, and patient because they are after the truth.  They know that rushing leads to incomplete data and more often, wrong data.  </p>



<p>You can stay calm and professional, and know what if they contacted you, they know who you are.  They don&#8217;t need you to reveal private data. </p>



<p>If you do receive questionable calls, emails, or personal visitors, check with the agencies.   Remember this comment from HHS:</p>



<p><span class="has-inline-color has-vivid-red-color"><strong><em>HIPAA covered entities and business associates should alert their workforce members, and can take action to verify that someone is an OCR investigator by asking for the investigator’s email address, which will end in @hhs.gov, and asking for a confirming email from the OCR investigator’s hhs.gov email address.</em></strong></span></p>
<p>The post <a href="https://aditigroup.com/ocr-imposters-office-for-civil-rights-investigators-are-they-real/">OCR Imposters &#8211; Office for Civil Rights Investigators, Are They Real?</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>NSA Finding Leads to Windows Security Update</title>
		<link>https://aditigroup.com/nsa-finding-leads-to-windows-security-update/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 15 Jan 2020 22:55:23 +0000</pubDate>
				<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[patch update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 7]]></category>
		<category><![CDATA[Windows 8.1]]></category>
		<category><![CDATA[Windows XP]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=324</guid>

					<description><![CDATA[<p>The post <a href="https://aditigroup.com/nsa-finding-leads-to-windows-security-update/">NSA Finding Leads to Windows Security Update</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_11  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><!-- divi:heading {"level":3} --></p>
<h3>Download and install the Windows updates released on January 14, 2020 immediately!</h3>
<p><!-- /divi:heading --> <!-- divi:paragraph --></p>
<p>Not every update from Microsoft is as critical as this one for your security. But this should be processed immediately.</p>
<p><!-- /divi:paragraph --> <!-- divi:paragraph --> <!-- /divi:paragraph --> <!-- divi:embed {"url":"https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF"} --></p>
<figure class="wp-block-embed">
<div class="wp-block-embed__wrapper">https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF</div>
</figure>
<p><!-- /divi:embed --> <!-- divi:embed {"url":"https://support.microsoft.com/en-us/help/4534306/windows-10-update-kb4534306"} --></p>
<figure class="wp-block-embed">
<div class="wp-block-embed__wrapper">https://support.microsoft.com/en-us/help/4534306/windows-10-update-kb4534306</div>
<div class="wp-block-embed__wrapper"></div>
<div class="wp-block-embed__wrapper"></div>
<div class="wp-block-embed__wrapper"></div>
<div class="wp-block-embed__wrapper"></div>
<div class="wp-block-embed__wrapper"></div>
<div class="wp-block-embed__wrapper"></div>
<div class="wp-block-embed__wrapper"></div>
<div class="wp-block-embed__wrapper"></div>
<div class="wp-block-embed__wrapper"></div>
</figure>
<p><!-- /divi:embed --> <!-- divi:heading --></p>
<h2></h2>
<h2></h2>
<h2>Don&#8217;t Keep It A Secret</h2>
<p><!-- /divi:heading --> <!-- divi:heading {"level":4} --></p>
<h4><em>Microsoft Would Like This Swept Under the Rug</em></h4>
<p><!-- /divi:heading --> <!-- divi:paragraph --></p>
<p>The MSNBC website found ZERO results in a quick search for <em>windows 10 security vulnerability</em> but other search and news sites have an every growing list of news articles and tech articles highlighting the latest Windows weakness and potential for exploit.</p>
<p><!-- /divi:paragraph --> <!-- divi:image {"id":326,"width":580,"height":343,"sizeSlug":"large"} --></p>
<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" src="https://aditigroup.com/data-privacy/wp-content/uploads/msnbc-microsoft-windows-problem.png" alt="" class="wp-image-326" width="580" height="343" /></figure>
<p><!-- /divi:image --> <!-- divi:paragraph --> <!-- /divi:paragraph --></div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div></p>
<p>The post <a href="https://aditigroup.com/nsa-finding-leads-to-windows-security-update/">NSA Finding Leads to Windows Security Update</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>October is National Cybersecurity Awareness Month</title>
		<link>https://aditigroup.com/october-is-national-cybersecurity-awareness-month/</link>
		
		<dc:creator><![CDATA[Ted Mayeshiba]]></dc:creator>
		<pubDate>Wed, 16 Oct 2019 22:48:21 +0000</pubDate>
				<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hackers]]></category>
		<category><![CDATA[Personal Privacy Invasion]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[VPN]]></category>
		<guid isPermaLink="false">https://aditigroup.com/?p=308</guid>

					<description><![CDATA[<p>Wondered why you&#8217;ve likely seen a bunch of articles about cybersecurity recently? Well, we should think about cybersecurity once in a while! The linked article is a good general deep dive into how to think about keeping your family safe in this connected world. Good advice about what to do if you think you&#8217;ve been [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/october-is-national-cybersecurity-awareness-month/">October is National Cybersecurity Awareness Month</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wondered why you&#8217;ve likely seen a bunch of articles about cybersecurity recently?  Well, we should think about cybersecurity once in a while!  The linked article is a good general deep dive into how to think about keeping your family safe in this connected world.  Good advice about what to do if you think you&#8217;ve been hacked (something strange pops up on one of your credit card statements for instance).  ABC&#8217;s of cybersecurity, use of VPNs, 2FA, and other good things.  One good idea, if you have a family and want to help introduce the concept of cybersecurity to children who will grow up in this cyberworld, that is to set up a family domain.  If you have questions, please ask.</p>
<p>https://www.ml.com/articles/digital-defense-keeping-your-family-safe-online.html</p>
<p>The post <a href="https://aditigroup.com/october-is-national-cybersecurity-awareness-month/">October is National Cybersecurity Awareness Month</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Malvertising Ransonware &#8211; Don&#8217;t Click on That Ad</title>
		<link>https://aditigroup.com/malvertising-ransonware-dont-click-on-that-ad/</link>
		
		<dc:creator><![CDATA[computer service]]></dc:creator>
		<pubDate>Wed, 23 Mar 2016 21:02:15 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[data encryption]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[mavertising]]></category>
		<category><![CDATA[ransom]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">http://aditigroup.com/data-privacy/?p=11</guid>

					<description><![CDATA[<p>Major websites were hit by a &#8220;malvertising&#8221; attack that hijacked people&#8217;s computers and demanded ransom. Something else to fear.  Yes, just when you thought web advertising couldn&#8217;t be more annoying with slow page loading, pop-ups in the middle of that interesting article and more Viagra than you ever care the know about&#8230;comes Malvertising ransomware. And [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/malvertising-ransonware-dont-click-on-that-ad/">Malvertising Ransonware &#8211; Don&#8217;t Click on That Ad</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Major websites were hit by a &#8220;malvertising&#8221; attack that hijacked people&#8217;s computers and demanded ransom.</em></p>
<p>Something else to fear.  Yes, just when you thought web advertising couldn&#8217;t be more annoying with slow page loading, pop-ups in the middle of that interesting article and more Viagra than you ever care the know about&#8230;comes Malvertising ransomware.</p>
<p>And it came in a big way as major websites that we trust and visit daily were hit by dangerous software hidden in advertisements.  This software is a form of <em><strong>ransonware</strong></em> which encrypts data and holds it hostage &#8211; for a price.</p>
<p>Were you hit already?  If so, the authorities say you&#8217;ll just have to pay up if you want your data back.</p>
<p>Read more &gt; <a href="http://www.cnet.com/news/new-york-times-bbc-dangerous-ads-ransomware-malvertising/">http://www.cnet.com/news/new-york-times-bbc-dangerous-ads-ransomware-malvertising</a></p>
<p>The post <a href="https://aditigroup.com/malvertising-ransonware-dont-click-on-that-ad/">Malvertising Ransonware &#8211; Don&#8217;t Click on That Ad</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Locky Ransomware &#8211; Data Lockout</title>
		<link>https://aditigroup.com/locky-ransonware/</link>
		
		<dc:creator><![CDATA[Security Expert]]></dc:creator>
		<pubDate>Tue, 16 Feb 2016 22:11:56 +0000</pubDate>
				<category><![CDATA[Malware]]></category>
		<category><![CDATA[Security Alert]]></category>
		<category><![CDATA[computer encryption]]></category>
		<category><![CDATA[data destruction]]></category>
		<category><![CDATA[erase]]></category>
		<category><![CDATA[Locky]]></category>
		<category><![CDATA[payment]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[wipe out]]></category>
		<guid isPermaLink="false">http://aditigroup.com/data-privacy/?p=13</guid>

					<description><![CDATA[<p>Network Admins and network users beware&#8230; Have you heard about the new Locky ransomware? It encrypts your data on network shares using AES encryption even when they aren&#8217;t mapped. Locky changes filenames for encrypted files to make it more difficult to restore the right data. Hollywood Presbyterian Medical Center paid hackers about $17,000 worth in Bitcoin. And reporters [&#8230;]</p>
<p>The post <a href="https://aditigroup.com/locky-ransonware/">Locky Ransomware &#8211; Data Lockout</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Network Admins and network users beware&#8230; Have you heard about the new Locky ransomware? It encrypts your data on network shares using AES encryption <strong>even when they aren&#8217;t mapped</strong>. Locky changes filenames for encrypted files to make it more difficult to restore the right data.</p>
<p>Hollywood Presbyterian Medical Center paid hackers about $17,000 worth in Bitcoin. And reporters at Forbes say Locky is infecting up to <strong>90,000 network systems every day</strong>.</p>
<p style="padding-left: 60px;"><em>When Locky encrypts a file it will rename the file to the format <strong>[fusion_builder_container hundred_percent=&#8221;yes&#8221; overflow=&#8221;visible&#8221;][fusion_builder_row][fusion_builder_column type=&#8221;1_1&#8243; background_position=&#8221;left top&#8221; background_color=&#8221;&#8221; border_size=&#8221;&#8221; border_color=&#8221;&#8221; border_style=&#8221;solid&#8221; spacing=&#8221;yes&#8221; background_image=&#8221;&#8221; background_repeat=&#8221;no-repeat&#8221; padding=&#8221;&#8221; margin_top=&#8221;0px&#8221; margin_bottom=&#8221;0px&#8221; class=&#8221;&#8221; id=&#8221;&#8221; animation_type=&#8221;&#8221; animation_speed=&#8221;0.3&#8243; animation_direction=&#8221;left&#8221; hide_on_mobile=&#8221;no&#8221; center_content=&#8221;no&#8221; min_height=&#8221;none&#8221;][unique_id][identifier].locky </strong>and creates ransom notes called <strong>_Locky_recover_instructions.txt.</strong></em></p>
<p><strong>So, please, BACKUP your data!</strong></p>
<p>&gt; <a href="http://www.forbes.com/sites/thomasbrewster/2016/02/18/ransomware-hollywood-payment-locky-menace/#2e6444fc75b0" target="_blank" rel="noopener noreferrer">Read more</a>[/fusion_builder_column][/fusion_builder_row][/fusion_builder_container]</p>
<p>The post <a href="https://aditigroup.com/locky-ransonware/">Locky Ransomware &#8211; Data Lockout</a> appeared first on <a href="https://aditigroup.com">Aditi Group Managed IT &amp; Consulting</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
