Blog

Top Security Webinars of 2022
featured
Nov 29, 2022

Top Security Webinars of 2022


Top Security Webinars of 2022

Top Security Webinars of 2022 Check out our top three webinars about security.

Read More
What to Look for in a Managed Service Provider

What to Look for in a Managed Service Provider Learn about the components that make up the best managed services providers and what you should consider for your business.

Read More
How Managed Security Services Assessments Help You Mitigate Risk

How Managed Security Services Assessments Help You Mitigate Risk Managed security services assessments help organizations identify gaps in their security and provide insight into how to mitigate risks.

Read More
Cloud Managed Services Pricing Options & Benefits

Cloud Managed Services Pricing Options & Benefits Technology companies structure and price their managed services offerings differently based on how they deliver services and staff their teams. Learn about your options in this blog.

Read More
Which Hybrid Cloud Model is Best for Your Business?

Which Hybrid Cloud Model is Best for Your Business? If you are looking for more control, improved security, predictable SLA’s and lower IT costs, adopting a hybrid cloud model for your business may be what you need.

Read More
What is Cloud Managed Services?

What is Cloud Managed Services? Learn about cloud-managed services and whether or not your business would benefit from adopting them in our latest blog.

Read More
Microsoft Follina Exploit & Mitigation Steps

Microsoft Follina Exploit & Mitigation Steps A recently announced exploit in Microsoft Support Diagnostic Tool (MSDT) allows threat actors to execute code on all versions of Windows using multiple versions of Office.

Read More
How Regulations Requiring Cyber Incident Notifications Affect Your Business

How Regulations Requiring Cyber Incident Notifications Affect Your Business Is your organization in compliance with these regulations requiring cyber incident notifications? If not, you may need to contact your legal team.

Read More
How to Avoid Tax Season Scams & Fraud Attempts

How to Avoid Tax Season Scams & Fraud Attempts Check out our list of helpful tips that you can use to protect yourself and your loved ones this tax season.

Read More
Multiple Vulnerabilities Reported in the Spring Framework for Java

Multiple Vulnerabilities Reported in the Spring Framework for Java The Spring Framework has three different publicly reported issues. Each of them, at various points, has been referred to as Spring4Shell or SpringShell. Find out how to mitigate your risks.

Read More
How to Mitigate Your Risk from Dirty Pipe/CVE-2022-0847

How to Mitigate Your Risk from Dirty Pipe/CVE-2022-0847 The latest vulnerability, Dirty Pipe, allows non-root user accounts to gain root-level privileges. Read our blog to find out what to do to protect your organization.

Read More
How to Mitigate Risk from Abused Stolen Nvidia Driver

How to Mitigate Risk from Abused Stolen Nvidia Driver A threat group called LAPSUS$ claims to have stolen 1 Terabyte of data from Nvidia, including the private key for a software signing certificate. Read our latest advisory blog to find out how to mitigate your risk.

Read More
Privacy Policy
Copyright © 2022 Coretek Services | Website by NYN Website Design + Marketing | Powered by Web OS
Loading...