24x7 Systems Monitoring
IT Support & Consulting
IT Equipment Leasing
Our Security Alliance
Enter the new era of threat prevention
Antivirus vendors even admit a different approach is needed to stop unknown attacks. But trying to stay just a step ahead is not enough to stop sophisticated attacks.
SentinelOne’s next-generation endpoint and server protection uses several layers of attack prevention, including behavior detection and machine learning, to stop attacks that other vendors simply can’t. It also provides unparalleled threat visibility at a minimum system impact.
Why Choose VirtualStrike?
- Establish value by implementing Enterprise IT solutions
- Enhance company efficiency and productivity leading to increased profitability
- Reduce security risks by monitoring infrastructure health
- Proactively manage your infrastructure to resolve and prevent issues as they develop
- We’re here to help. As an extension of your office, we provide comprehensive help desk support to exceed the expectations of your office needs.
- We have the highest rated security team in the industry, monitoring and resolving threats 24x7x365
Let’s Discuss Your Needs
Latest Cyber Security News
The Army is Falling Behind on Staffing Cyber Units, GAO Says
on August 17, 2019 at 6:45 am
The Army is struggling to staff, train and equip its newly activated cyber and electronic warfare units, and officials haven’t assessed how those challenges will impact the Pentagon’s digital capabilities, according to a congressional watchdog. The Army activated two digital warfare units last year despite significant personnel shortages, auditors said, and officials are struggling to update the equipment and doctrine used to train soldiers. While Army officials said the digital threats posed by Russia and other adversaries justify the accelerated deployment process, auditors said the hasty plan could leave the Army “fielding units that are not capable of providing the needed capabilities.” Army officials told GAO they’re struggling to recruit personnel to fill their new cyber units, particularly for high-level positions. Army officials are also required to conduct a risk assessment whenever they activate a new unit, but GAO found the branch hasn’t completed those evaluations for its new cyber squads.
Get those 8GB files ready: DISA launches new unclassified file transfer system
on August 17, 2019 at 6:30 am
A new file transfer system for unclassified Department of Defense material reached initial operating capability Thursday. The DOD Secure Access File Exchange (SAFE) will replace the current system, which was developed by the Army and has the same name. The first version of SAFE was designed for a smaller set of users, and the new technology will reach enterprisewide, according to a release from the Defense Information Systems Agency. The file transfer system will work on the Pentagon’s non-classified network, known as NIPERNet. The transfer system will be secure enough to transfer documents marked for official use only, ones with personally identifying information and protected health information, according to the release. The system will offer package-level encryption and require a Common Access Card to initiate all transfers.
Canadian city loses big money in phishing scam
on August 17, 2019 at 6:00 am
Saskatoon Mayor Charlie Clark -- seen here in March 2019 at the Juno Awards -- has warned of the dangers of identity theft (AFP Photo/Tom Szczerbowski) Ottawa (AFP) - The city of Saskatoon in Canada's western prairies has lost more than Can $1 million to a fraudster posing as a construction executive, in the latest online phishing scam to plague one of the country's cities. The fraudster impersonated the chief financial officer of a local construction company to advise the city of a change in banking information in an email, the local government said in a statement. The city then deposited a payment of Can $1.04 million (US$780,000) into the fraudulent account. "It's a million dollars of taxpayer money," said Charlie Clark, mayor of the city of 270,000 people. The city of Burlington, Ontario was similarly defrauded of more than Can$500,000, and a university in Edmonton, Alberta was swindled out of nearly Can$12 million in 2017.
Decade-Long Bank Account Hacking Scheme Gets Fraudster 57 Months
on August 17, 2019 at 6:00 am
In this case, the account hijacking attacks were the result of account info stolen from tens of thousands of businesses and individuals, information which allowed Elcock and his co-conspirators to defraud their victims. Hacking bank accounts for over 10 years "Between 2008 and 2018, ELCOCK, co-defendant Shoshana Marie McGill, and other co-conspirators participated in a scheme to defraud banks and e-commerce retailers by using stolen personal identifying information ('PII'), bank account information, and credit and debit card data from tens of thousands of individuals and businesses for personal financial gain," says the Department of Justice press release. They also admitted to hacking into some of their victims' email accounts, online bank accounts, and password vaults, which allowed them to collect more personal info, user credentials, and copies of checks.
Coinbase Reveals Password Glitch Affecting 3,500 Customers
on August 17, 2019 at 5:15 am
Crypto exchange Coinbase disclosed a potential vulnerability Friday, announcing that a tiny fraction of its customers’ passwords were stored in plain text on an internal server log. In a post-mortem shared with CoinDesk, Coinbase outlined “a password storage issue,” impacting less than 3,500 customers (out of more than 30 million worldwide) that briefly resulted in personal information, including the passwords, being stored in clear text on internal logging systems. “Under a very specific and rare error condition, the registration form on our signup page wouldn’t load correctly, which meant that any attempt to create a new Coinbase account under those conditions would fail,” the post explained. The exchange fixed the issue by switching the default form method to “POST,” to ensure data is no longer logged. In response to the discovery, Coinbase said it tracked the various location where the logs might be stored, which included a system hosted on Amazon Web Services and some “log analysis service providers.&rdquo