About Stacey Ehling

This author has not yet filled in any details.
So far Stacey Ehling has created 31 blog entries.

Global Conflict: Increase Cyber Vigilance

By |2025-06-13T14:19:42-04:00June 13th, 2025|

The NJCCIC assesses that heightened geopolitical tensions and military confrontation in the Middle East significantly increase the risk of offensive cyber operations by both nation-states and those sympathetic to them and their ideology. While the primary targets of these cyber activities may be the entities in the conflict, the interconnected nature of our global digital [...]

June: Internet Safety Month

By |2025-06-05T10:50:23-04:00June 5th, 2025|

This is Online Safety Month, take a few moments to refresh your knowledge on some online safety basics. Behaviors like using strong passwords, turning on multi-factor authentication (MFA), recognizing and reporting phishing, and updating your software can go a long way in helping you to stay safe online! Click here to get more tips and [...]

Google Chrome Vulnerabilities

By |2025-06-04T10:45:53-04:00June 4th, 2025|

Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged-on user. Depending on the [...]

KEV: Known Exploited Vulnerability Catalog

By |2025-05-29T14:18:13-04:00May 29th, 2025|

Keeping up with new vulnerabilities can be challenging. To help, CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild: the Known Exploited Vulnerability (KEV) catalog. CISA strongly recommends all organizations review and monitor the KEV catalog and prioritize remediation of the listed vulnerabilities to reduce the likelihood of compromise by [...]

May 1: World Password Day

By |2025-04-24T21:37:52-04:00April 24th, 2025|

If you are still writing your passwords on sticky notes, or using your dog's name, you need to make some time to learn how to create strong passwords to protect your data. Click here for resources and information provided by the National Cyber Security Alliance.

Shields Up: Guidance for Organizations

By |2025-03-12T15:53:30-04:00March 12th, 2025|

The Cybersecurity & Infrastructure Security Agency (CISA) recommends all organizations—regardless of size—adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets.  Here are some recommendations to help protect your organization: Reduce the likelihood of a damaging cyber intrusion Validate that all remote access to the organization’s network and privileged or [...]

Google Android OS – Remote Code Execution

By |2025-03-12T15:37:26-04:00March 12th, 2025|

he Multi-State Information Sharing and Analysis Center has issued another advisory relating to vulnerabilities in Google Android OS that could allow for remote code executition with no additional privileges needed. This includes, phones, smart watches, tablets and other devices. Threat Intelligence: Google indicates limited, targeted exploitation of CVE-2024-43093 and CVE-2024-50302. Systems Affected: Android OS patch [...]

Critical Patches Issued: Microsoft Products

By |2025-02-12T12:29:10-05:00February 12th, 2025|

Critical Patches Issued for Microsoft Products Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged-on user. Depending on the privileges associated with the user, threat actors could then install programs, view, change, or delete data, or create new accounts [...]

Google Android OS Vulnerabilities

By |2025-02-07T16:01:56-05:00February 7th, 2025|

Multiple vulnerabilities have been discovered in Google Android OS (Patch levels prior to 2025-02-05), the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow [...]

Data Privacy Week: Jan. 27-31

By |2025-01-27T13:56:39-05:00January 27th, 2025|

Take Charge of Your Data is the theme of Data Privacy Week 2025, an international effort to empower individuals and businesses to respect privacy, safeguard data and enable trust.  For more information, resources and helpful tips to protect your data visit the National Cybersecurity Alliance website:  https://www.staysafeonline.org/data-privacy-week   

Go to Top