Multiple vulnerabilities have been discovered in Microsoft products, according to a report from the New Jersey Cybersecurity & Communications Integration Cell. The most severe vulnerabilities could allow for remote code execution in the context of the logged on user.
Depending on the privileges associated with the user, an attacker could be able to install programs; view, change, or delete data; or create new accounts with full user rights. For users whose accounts are configured to have fewer user rights on the system, there might be less of an impact compared to those who operate with administrative user rights.
A full list of all vulnerabilities can be found here.
- Applying appropriate patches or appropriate mitigations provided by Microsoft to vulnerable systems immediately after appropriate testing.
- Applying the Principle of Least Privilege to all systems and services, and running all software as a non-privileged user to diminish the effects of a successful attack.
- Reminding all users not to visit untrusted websites or follow links/open files provided by unknown or untrusted sources.
- Using capabilities to prevent suspicious behavior patterns from occurring on endpoint systems.
At TNTMAX, our Managed IT Services provide you with an increased level of cybersecurity.
“In the absence of an internal IT Department, one of the most impactful benefits of our Managed IT Services is that when it comes to major security and vulnerability recommendations and “Best Practice” guidelines, we can seamlessly monitor, manage and address the required changes for your systems,” said TNTMAX COO Eric Valdes. “When you subscribe to our monthly support offerings coupled with (RMM) Remote Monitoring and Management, you can rest easy knowing that we’ve got you covered.”
For more information on cybersecurity call us at 201-891-8686 or email [email protected]