Let's Connect
  • Sales Chat
  • Remote Session
  • Sales: (973) 963-2736 Sales: (973) 963-2736
  • Support: (973) 770-0500 Support: (973) 770-0500
  • Login
  • IT Consulting
  • Software Development
  • Cloud
  • About
  • Contact
  • Support
Menu
  • IT Consulting
  • Software Development
  • Cloud
  • About
  • Contact
  • Support
Search
Login

Archives

View Archives
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018
  • 2022
  • 2021
  • 2020
  • 2019
  • 2018

Categories

Categories
  • Announcements
  • Apple
  • Applications
  • Arctic Wolf Networks
  • Azure
  • Azure Virtual Desktop (AVD)
  • Backup and Disaster Recovery
  • Business Continuity
  • BYOD
  • Cloud Computing
  • Compliance
  • Coronavirus
  • COVID-19
  • Cryptocurrency
  • Customer Service
  • Cybersecurity
  • DFARS
  • Dynamics NAV Hosting
  • Ethical Hacking
  • Firewall-as-a-Service
  • HIPAA
  • iOS
  • IT Best Practices
  • IT Expenses
  • IT Outsourcing
  • IT Security
  • Legal Vertical
  • Linux
  • Managed IT Services
  • Medical, EMR, EHR
  • Microsoft Azure
    • Powershell
  • Microsoft Power Platform
  • Mobile
  • Mobile Computing
  • New Jersey
  • New York City (NYC)
  • Office 365
  • PCI
  • Rancho Cucamonga Location
  • Regulatory Compliance
  • SharePoint
  • SiteLink
  • Small Business
  • SOCaaS
  • Software Development
  • Sort of Technical
  • Tools/Utilities
  • Troubleshooting
  • Ubuntu
  • Uncategorized
  • Very Technical
  • Virtualization
  • Windows Cloud PC
  • Windows Surface
  • Windows Virtual Desktop (WVD)
  • Work from Home
  • Announcements
  • Apple
  • Applications
  • Arctic Wolf Networks
  • Azure
  • Azure Virtual Desktop (AVD)
  • Backup and Disaster Recovery
  • Business Continuity
  • BYOD
  • Cloud Computing
  • Compliance
  • Coronavirus
  • COVID-19
  • Cryptocurrency
  • Customer Service
  • Cybersecurity
  • DFARS
  • Dynamics NAV Hosting
  • Ethical Hacking
  • Firewall-as-a-Service
  • HIPAA
  • iOS
  • IT Best Practices
  • IT Expenses
  • IT Outsourcing
  • IT Security
  • Legal Vertical
  • Linux
  • Managed IT Services
  • Medical, EMR, EHR
  • Microsoft Azure
    • Powershell
  • Microsoft Power Platform
  • Mobile
  • Mobile Computing
  • New Jersey
  • New York City (NYC)
  • Office 365
  • PCI
  • Rancho Cucamonga Location
  • Regulatory Compliance
  • SharePoint
  • SiteLink
  • Small Business
  • SOCaaS
  • Software Development
  • Sort of Technical
  • Tools/Utilities
  • Troubleshooting
  • Ubuntu
  • Uncategorized
  • Very Technical
  • Virtualization
  • Windows Cloud PC
  • Windows Surface
  • Windows Virtual Desktop (WVD)
  • Work from Home

Microsoft
HP
Lenovo
Veeam
VMware
Extreme Networks
Dell PartnerDirect
SonicWall
Home Blog IT Security

IT Security



Are Windows 365 Cloud PCs Secure?

Posted on April 7th, 2021 in Azure, Azure Virtual Desktop (AVD), Cybersecurity, IT Best Practices, IT Security, Microsoft Azure, Virtualization, Windows Cloud PC, Windows Virtual Desktop (WVD)

Imagine that your employee’s personal computer has been hacked. They only ever used one password for personal accounts, and one of the online stores they shop at has been breached. Their password was made public on the dark web, and cybercriminals have used it to hack into their laptop. Now, imagine that your employee is using their personal computer for…(read more).

Comments (0)

Restrict WAN access to a Sonicwall management interface

Posted on September 22nd, 2020 in Firewall-as-a-Service, IT Best Practices, IT Security, Sort of Technical, Troubleshooting

Securing administrative access to your Sonicwall from the WAN There are several reasons you may want to enable remote management on the public-facing (WAN) interface of a Sonicwall firewall: Remote assistance is needed with the initial configuration Virtual Private Networking (VPN) has not yet been configured You require temporary remote polling or administration For security reasons, you should constrain this…(read more).

Comments (0)

Exploiting Rowhammer Remotely (Throwhammer)

Posted on August 20th, 2018 in Cybersecurity, IT Security

  It’s been three years since the introduction of rowhammer, a technique of bypassing memory isolation protection mechanisms to flip bits in memory.  This attack occurs when a hacker gains code execution privileges on a local system and then rapidly writes and rewrites memory to force capacitor errors in DRAM.  This corruption of memory contents can lead to the wrong instructions…(read more).

Comments (0)

The Small Business Owner’s Guide to Preventing Data Loss and Theft in 2018

Posted on December 8th, 2017 in Cybersecurity, IT Best Practices, IT Security, Small Business

Did you know that 50% of all cyberattacks carried out today target small businesses? In fact, CNBC reported in April 2017 that 14 million businesses had been attacked in the last year alone. Your business could be next. But it doesn’t have to be! The truth is that there are steps every small business owner can take to protect their…(read more).

Comments (0)

Why Choose Exigent Technologies for Server Management?

Posted on November 21st, 2017 in Backup and Disaster Recovery, IT Security

A business is only as strong as the people who work there. However, in the Information Age, those employees are only as strong as the IT infrastructure they depend on. The experts at Exigent know this, which is why we’ve dedicated our careers to helping businesses like yours maximize your return on your IT investment. Whether you’re in a small…(read more).

Comments (0)

Serious Flaw Identified in the Most Common Wireless Security Platform

Posted on October 16th, 2017 in Cybersecurity, IT Security

Yesterday, researchers identified a security flaw in the wireless standard (WPA2 or “Wifi Protected Access v2”) used by all hardware and software vendors worldwide. The flaw is known as “KRACK” after the methodology used to gain access to secure wireless networks (key reinstallation attacks). Summary WPA2 is the wireless standard that defines how devices and wireless networks exchange data securely with one…(read more).

Comments (0)

What We Test When Doing a Third Party Penetration Test

Posted on October 5th, 2017 in Compliance, Cybersecurity, IT Security

What We Are Doing During The Third Part of Penetration Testing With the proliferation of both small and high-profile breaches occurring globally, it is vital to identify and diagnose security vulnerabilities in your company’s IT infrastructure and assets before a breach or intrusion takes place.  3rd. party penetration testing is an excellent tactic to employ. Penetration testing, (“pen testing“) is…(read more).

Comments (0)

Fireball Malware Protection and Removal Advice

Posted on August 7th, 2017 in Cybersecurity, IT Security

Protect yourself and network from the Fireball Malware Malware is increasingly being used by scammers to generate huge profits, and if the recent Fireball malware is any indication, scammers are more sophisticated than ever. The Fireball malware hijacks your web browser, changing your homepage and default search engine while preventing you from changing them back. It also gathers your private…(read more).

Comments (0)

How to Avoid WannaCry and Future Ransomware Hacks

Posted on May 26th, 2017 in Cybersecurity, IT Security

                  It’s enough to make you want to… well, you know. The WannaCry virus has wreaked havoc across the globe, shutting down hospitals in the UK, seizing control of displays at train stations, and causing billions in damages across 150 countries. Many organizations paid ransoms of $300 to $600 per PC in…(read more).

Comments (0)

Microsoft to Retire SHA1 Certificates in Mid-2017

Posted on March 16th, 2017 in IT Security

Here an issue that we are starting to hear more about for clients in the NJ and NY areas where we are providing cybersecurity consulting services.  In fact, we’ve dealt with it internally here at our NJ offices. The Basics Hashing is the transformation of a string of characters into a usually shorter fixed-length value or key that represents the…(read more).

Comments (0)
« Older Posts
Our Core Values:
  • We are always 100% committed to our customers' needs.
  • We value charity and goodwill.
  • We realize there are no shortcuts to true excellence.
  • We believe in the power of teamwork and collaboration.
  • We honor the golden rule.
  • We are humble.
  • We value transparency.
  • We are honest and value integrity.
  • We lead by example.
  • We value continuous education.
  • We value innovation and forward-thinking.
  • We foster a passion for life, work and everything in between.
  • We discourage negativity.

More About Us

Exigent Technologies LLC is a full-service information technology consulting firm that implements and maintains high-performance IT systems for small and medium-sized organizations in a wide range of industries. Regardless of their size, today’s companies rely on anytime, anywhere access to information—and Exigent delivers.
read more

Click for the Business Profile for Exigent Technologies LLC
BBB RATING: A+

Want To Find Out More?









    • IT Support & Consulting Services
    • Software Development
    • Cloud
    • About
    • Contact
    • Client Support
    • Areas Served
    • Make a Payment

    Sign Up For Updates

    IT Services, IT Consultants and Cloud Computing | New Jersey | New York City
    55 Madison Avenue, STE 400, Morristown, NJ 07960 | 845 3rd Ave FL 6, New York, NY 10022

    Copyright 2022. Exigent. All rights reserved. Privacy Policy|WordPress Website Produced by: Inverse Paradox

    Facebook Twitter LinkedIn YouTube Glassdoor Instagram TikTik