Print Page | Sign In | Create a Login
News & Press: News

CFPB and Important Microsoft Security Updates

Wednesday, February 19, 2014  
Share |
Microsoft came out with several security updates this month…

Under the CFPB rules, you are responsible to keep your customers’ information safe as possible and one of the ways is to keep all Windows Updates and Anti-Virus Software current.

Example: You can enter a customer’s information in some websites, a keylogger* program on your computerwill copy everything you type and they will steal all the information!

Below is a link to one of the many update fixes released this month. You may go to the link below and see them all...

https://technet.microsoft.com/en-us/security/bulletin/ms14-feb

This is only one of the Cumulative Security Updates:
Internet Explorer (2909921)

This security update resolves one publicly disclosed vulnerability and twenty-three privately reported vulnerabilities in Internet Explorer. The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited the most severe of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

These updates are CRITICAL for your security…

To help you install updates, please see this YouTube video tutorial:
https://www.youtube.com/watch?v=t72Osz4l9ME


*A keylogger program does not require physical access to the user's computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as
spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program. Related glossary terms: managed security services (MSS), spam filter, IPsec (Internet Protocol Security), port scan, unified threat management (UTM), script kiddy (or script kiddie), Snort, remote access, risk analysis, malware (malicious software)