Did You Know That Applying Operating System Patches is Critical to Your Security?

What is patch management? Patch management is the technique of planning, testing, and installing patches to a computer or computer system to keep it up to date, as well as determining which patches should be applied to which systems. Patching operating systems is very similar to patching applications with a potentially more significant risk of […]
Did You Know That You Can Restrict Admin Privileges On Your PC?

In many businesses, staff have full admin rights to their computers. Pharmacy is no different, with staff logging on to their computers as local administrators. Often this is a default set-up implemented by the local IT provider or their pharmacy software provider. Unfortunately, from a security perspective, it is a risky practice. For the best […]
Did You Know That Application Hardening Can Improve Your System’s Security?

User application hardening reduces the ‘attack surface’ threat actors can use to install malicious software onto computer systems (e.g., POS and Dispense). Modifying default settings, blocking, or removing common software used to download or run malware or other malicious code prevents it from running and disrupting your pharmacy IT services. Application Hardening is best applied […]
Did you know that Office Macros Can Be a Cyber Security Risk?

What are Office Macros? Microsoft Office files can contain embedded code (known as a macro) written in Visual Basic for Applications (VBA) programming language. A macro can contain a series of commands that can be coded or recorded and replayed at a later time. This can help to automate repetitive tasks. However, an adversary can […]
Did you know that Patching Applications is not the same as Patching Operating Systems?

It’s critical to update your applications whenever possible. Patching applications prevent threat actors from using known security vulnerabilities to breach your network and achieve their objectives. Patching Applications is not the same as Patching Operating Systems First, patching applications is not the same process as patching operating systems. Patching applications is about applying updates and […]
Did you know that application control technologies can help stop the execution of malware?

Application control, sometimes called application whitelisting, is a security approach designed to protect against malicious code (also known as malware) executing on systems. Application control technologies are intended to stop the execution of malware and other unauthorised software. Application control technologies are often more effective at stopping unknown malware threats than conventional antivirus software and other […]
Did You Know There Are Risks With Running End of Life Software and Operating Systems?

All computer hardware and software have a product lifecycle. There are many risks of using old and outdated software and hardware. Knowing the risks can help you decide when to upgrade and what might happen if you choose not to. End of Support ‘End of support’ is the expiry date for products. It happens when […]
Did you know that not all Antivirus are the same?

Did You Know That Not All Antivirus Are The Same? Traditional antivirus software was designed to block file-based malware by scanning files and quarantining any malicious executables it finds. It requires daily updates and uses many system resources to run. This solution was acceptable in the early days of security software. However, attacks have evolved […]
Corum Cyber Alert: Microsoft Support Diagnostic Tool Vulnerability

Microsoft Support Diagnostic Tool Vulnerability On Monday, May 30, 2022, Microsoft issued a security alert for a discovered vulnerability in the Microsoft Support Diagnostic Tool (MSDT). A threat actor will send a specially crafted email or office document and upon opening the link in the email or document, MSDT will launch and run code or […]
Did you know that ACSC has developed a list of the Essential 8 mitigation strategies to prevent cyber incidents?

Did you know that ACSC has developed a list of the Essential 8 mitigation strategies to prevent cyber incidents? The Australian Cyber Security Centre (ACSC) has developed a list of the Essential 8 mitigation strategies to prevent cyber incidents. The Essential Eight are designed to protect Microsoft Windows-based internet-connected networks such as those typically found […]