About Stacey Ehling

This author has not yet filled in any details.
So far Stacey Ehling has created 27 blog entries.

May 1: World Password Day

By |2025-04-24T21:37:52-04:00April 24th, 2025|

If you are still writing your passwords on sticky notes, or using your dog's name, you need to make some time to learn how to create strong passwords to protect your data. Click here for resources and information provided by the National Cyber Security Alliance.

Shields Up: Guidance for Organizations

By |2025-03-12T15:53:30-04:00March 12th, 2025|

The Cybersecurity & Infrastructure Security Agency (CISA) recommends all organizations—regardless of size—adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets.  Here are some recommendations to help protect your organization: Reduce the likelihood of a damaging cyber intrusion Validate that all remote access to the organization’s network and privileged or [...]

Google Android OS – Remote Code Execution

By |2025-03-12T15:37:26-04:00March 12th, 2025|

he Multi-State Information Sharing and Analysis Center has issued another advisory relating to vulnerabilities in Google Android OS that could allow for remote code executition with no additional privileges needed. This includes, phones, smart watches, tablets and other devices. Threat Intelligence: Google indicates limited, targeted exploitation of CVE-2024-43093 and CVE-2024-50302. Systems Affected: Android OS patch [...]

Critical Patches Issued: Microsoft Products

By |2025-02-12T12:29:10-05:00February 12th, 2025|

Critical Patches Issued for Microsoft Products Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged-on user. Depending on the privileges associated with the user, threat actors could then install programs, view, change, or delete data, or create new accounts [...]

Google Android OS Vulnerabilities

By |2025-02-07T16:01:56-05:00February 7th, 2025|

Multiple vulnerabilities have been discovered in Google Android OS (Patch levels prior to 2025-02-05), the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow [...]

Data Privacy Week: Jan. 27-31

By |2025-01-27T13:56:39-05:00January 27th, 2025|

Take Charge of Your Data is the theme of Data Privacy Week 2025, an international effort to empower individuals and businesses to respect privacy, safeguard data and enable trust.  For more information, resources and helpful tips to protect your data visit the National Cybersecurity Alliance website:  https://www.staysafeonline.org/data-privacy-week   

Predictions & Challenges for 2025

By |2025-01-09T16:28:48-05:00January 9th, 2025|

What cybersecurity issues and challenges are being predicted for 2025? Here are some links to recent articles published by experts: Cybersecurity Predictions for 2025: Challenges & Opportunities (National Cyber Security Alliance)  4 Cybersecurity Trends to Watch in 2025 (Cybersecurity Dive)  Predictions for 2025 and Beyond (Cyber Security Defense Magazine) The Top 25 Security Predictions for [...]

Cybersecurity Risks to Water and Wastewater Systems

By |2024-12-16T11:15:27-05:00December 16th, 2024|

The Cybersecurity and Infrastructure Security Agency (CISA) and the Environmental Protection Agency (EPA) published a fact sheet providing mitigations and resources for the Water and Wastewater Systems (WWS) Sector using human machine interfaces (HMIs) to limit exposure on the internet and secure them against malicious cyber activity. HMIs enable operational technology owners and operators to [...]

Payroll Pirates Target Workday & HR Portals

By |2024-12-12T18:03:32-05:00December 12th, 2024|

Analysts began monitoring a phishing scam known as “Payroll Pirates” that involves payroll redirection and primarily targets employees of various organizations, particularly those using Workday. The threat actors use malicious SEO poisoning and spoofed Human Resources (HR) pages to trick victims into providing employee portal credentials. Once they gain account access, they change banking information [...]

End of the Year Backups

By |2024-12-12T17:49:20-05:00December 12th, 2024|

One of the best ways to protect your data and files is to make sure you are backing up your systems frequently and that your backup is stored securely offline.  Read more in this article published by the NJCCIC Backups the Cure for Viral Cyber Infection.  

Go to Top