Blog
Virtual Administrator’s May 2012 Patch Recommendations
Virtual Administrator’s May 2012 Patch Recommendations We have not uncovered any widespread problems with any of these patches and are releasing all of them. A number of MS Office vulnerabilities addressed this month. If you have machines with Office Word 2007 deployed, installing MS12-029 is the top priority. After that MS12-034 is the most concerning…
Adobe releases Flash exploit fix for all platforms; Windows users already targeted
Flash has a new update out to fix a vulnerability which is reportedly already being exploited in the wild. Time to shine as MSPs and keep our customers up to date :). More information at the article below. http://tpt.to/a2sXDMn
Chris Amori live at Kaseya Connect 2012
Our very own Chris Amori is going to be giving a presentation live at Kaseya connect! If you’re hanging out there, be sure to stop in, otherwise you can watch live on their ustream channel! http://www.kaseyaconnect.com/live/ Chris’ session starts at 3:15PM PST on Thursday. He will be presenting: Real-world Alerting Best Practices for MSPs You…
Virtual Administrator’s April 2012 Patch Recommendations
We have not uncovered any widespread problems with any of these patches and are releasing all of them. While MS12-027 is the only patch any know exploits, Microsoft rates MS12-023 and as “Likely to see reliable exploits developed within next 30 days” MS12-023 fixes several vulnerabilities in Internet Explorer and MS12-024 addresses a security…
New Kaseya Cloud Updates
Today Kaseya is going to be making some changes to KLC on their cloud offering. The details are below: Hello Folks, This Thursday, the CloudOPS team will deploy a new back-end feature to the cloud platform which will enable new KLC global relay functionality. Over the past few months, we have been working on a…
Virtual Administrator's March 2012 Patch Recommendations
We have not uncovered any widespread problems with any of these patches and are releasing all of them. MS12-020 is rated Critical. After your next patch cycle completes you should follow up and make sure this is installed. This is an RDP vulnerability and only machines with this enabled are at risk. Although this was…