Microsoft Advisories
20 January 2021
- 4053440 - Securely opening Microsoft Office documents that contain Dynamic Data Exchange (DDE) fields - Version: 3.0
- 4056318 - Guidance for securing AD DS account used by Azure AD Connect for directory synchronization - Version: 1.0
- 4038556 - Guidance for securing applications that host the WebBrowser Control - Version: 1.0
- 4033453 - Vulnerability in Azure AD Connect Could Allow Elevation of Privilege - Version: 1.0
- 4025685 - Guidance related to June 2017 security update release - Version: 1.0
U.S. Security Alerts
20 January 2021
-
AA21-008A: Detecting Post-Compromise Threat Activity in Microsoft Cloud Environments
Original release date:...
-
AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations
Original release date:...
-
AA20-345A: Cyber Actors Target K-12 Distance Learning Education to Cause Disruptions and Steal Data
Original release date:...
-
AA20-336A: Advanced Persistent Threat Actors Targeting U.S. Think Tanks
Original release date:...
Cisco Advisories-Main
20 January 2021
-
Cisco IP Phone TCP Packet Flood Denial of Service Vulnerability
A vulnerability
... -
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Remote Command Execution and Denial of Service Vulnerabilities
Multiple
... -
Multiple Vulnerabilities in dnsmasq DNS Forwarder Affecting Cisco Products: January 2021
A set of
... -
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers Management Interface Stored Cross-Site Scripting Vulnerabilities
Multiple
... -
Cisco AnyConnect Secure Mobility Client for Windows DLL Injection Vulnerability
A vulnerability
...
Information Technology in Today's Global Marketplace
For Businesses of All Sizes
Many are saying we need to move to a centralized model. They say "the Cloud" is our salvation.
But how many of them can guarantee a secure environment?
At ClearDay Systems, we believe in a distributed, de-centralized model. Even the largest companies maintain multiple datacenters—a hedge against potential catastrophic events, whether from freak accidents, terrorism, riots, or even cybersecurity breaches.
We won't ask you to put all your data in the cloud just because others are doing so. Because your data is critical to the pursuit of your firm's ambitions, we will work with you to store archives off-site. If you have critical data that can't be compromised, we can help you find a datacenter product that fits your needs and isn't a prime target for the malicious threats that shroud the Cloud.
And if you do maintain on-site networks, we can help you to secure them by testing for weaknesses, building additional safeguards at the edge of your network, and actively monitoring for potential threats that may find their way in.
Learn more about what it means to truly secure your data in this age of break-ins. Don't buy in to the hype. Instead, work with us to find a tailored solution to meet your firm's needs, whether a small or medium business or larger concerns that desire to forge on in maintaining control of their own networks.