24x7 Systems Monitoring
IT Support & Consulting
IT Equipment Leasing
Our Security Alliance
Enter the new era of threat prevention
Antivirus vendors even admit a different approach is needed to stop unknown attacks. But trying to stay just a step ahead is not enough to stop sophisticated attacks.
SentinelOne’s next-generation endpoint and server protection uses several layers of attack prevention, including behavior detection and machine learning, to stop attacks that other vendors simply can’t. It also provides unparalleled threat visibility at a minimum system impact.
Why Choose VirtualStrike?
- Establish value by implementing Enterprise IT solutions
- Enhance company efficiency and productivity leading to increased profitability
- Reduce security risks by monitoring infrastructure health
- Proactively manage your infrastructure to resolve and prevent issues as they develop
- We’re here to help. As an extension of your office, we provide comprehensive help desk support to exceed the expectations of your office needs.
- We have the highest rated security team in the industry, monitoring and resolving threats 24x7x365
Let’s Discuss Your Needs
Latest Cyber Security News
PayID data breaches show Australia’s banks need to be more vigilant to hacking
on September 18, 2019 at 10:30 am
PayID allows customers to attach their mobile phone number or email address to their bank account. Launched in February 2018 by New Payments Platform Australia, an alliance of 13 banks, PayID is reportedly available to more than 52 million account holders across almost all major financial institutions. When entering a PayID mobile phone number to make a payment, the full name of the account holder is displayed, so the person making the payment can ensure they are sending it to the right PayID account. Shortly after the service launched, Twitter users began pointing out that this means you can enter random phone numbers and, if that number has been linked to a PayID account, the account holder’s name will show up – rather like a phone book in reverse. In June 2019, around 98,000 PayID details were obtained after hackers used several online bank accounts to carry out more than 600,000 PayID lookups over the course of six weeks, reportedly by simply entering phone numbers in sequential order. Although bank customers can do little more than think twice before responding to messages, the real power is with the banks.
U.S. cyber-offensive against ISIS continues, and eyes are now on Afghanistan, general says
on September 18, 2019 at 10:15 am
Written by Shannon Vavra Sep 17, 2019 | CYBERSCOOP As loyalties among Afghanistan’s Islamic extremists continue to shift, the U.S. military may be poised to rely more heavily on offensive cyber capabilities to target one group in particular — the dispersed but still active membership of ISIS, according to one military cyber commander. Joint Task Force ARES, the outfit charged with running joint and coalition cyber-operations against ISIS, is working to uncover information about how the terrorist group continues to operate in Afghanistan, the deputy commander said Monday. Security experts are concerned that ISIS is gaining momentum in Afghanistan in part because of the Trump administration’s efforts to establish a peace deal with the Taliban, according to the Financial Times. Known operations have included an operation in 2017 in which U.S. and coalition forces used digital means to shut down ISIS command posts one by one, forcing ISIS to reveal alternate command posts in Iraq and Syria. This allowed the Department of Defense to launch traditional military attacks against the outposts.
MITRE Releases 2019 List of Top 25 Software Weaknesses
on September 18, 2019 at 10:00 am
MITRE Releases 2019 List of Top 25 Software Weaknesses The list includes the most frequent and critical weaknesses that can lead to serious software vulnerabilities. MITRE today published a draft of the Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Errors, a list of the most widespread and critical weaknesses that could lead to severe software vulnerabilities, as the organization explained a release on the news. This year's Top 25 is the first release of the list since 2011, Buttner points out, but MITRE's goal going forward is to release a new list for each year. While weaknesses toward the end of the list have fallen out in favor of new ones, the top weaknesses generally remain the same. Buttner and Levendis anticipated buffer overflow would be near top of the list, as it was also near the top in 2011 and it's a well-known weakness throughout the industry.
Hacking the Smart Home via the Internet of Things
on September 18, 2019 at 9:45 am
Today's Internet of Things (IoT) devices enable "smart homes" that use the Web to connect smartphone apps to home Wi-Fi, which in turn is connected to myriad smart IoT devices. The convenience of IoT devices has resulted in a burgeoning "IoT device smart home market [that] is expected to swell to nearly $60 billion" by next year, according to a study by IoT platform Particle, as reported by TechRepublic. The smart IoT devices evaluated included eight cameras, seven motion sensors, two contact sensors, two water sensors, two video doorbells, a dead bolt door lock, a smart button (to control lights, electronics, and small appliances), and a smart garage door opener. The NCSU researchers demonstrated critical design errors that allowed two hacker attack vectors to blind or confuse 22 of the 24 smart home IoT devices.
New data strategy combats modern threats, says Army's G-6
on September 18, 2019 at 9:30 am
Lt. Gen. Bruce Crawford, the Army's CIO/G-6, laid out the Army's blueprint to overcome data problems while speaking at the Association of the U.S. Army's "Hot Topics" forum on cyber and networks. "Regardless of where our data is, it's got to be interoperable," Crawford said. "And, ultimately it's got to be secure." Crawford said delivering a network in the era of great-power competition will be "fundamentally different than anything we've done before." The new strategy is currently awaiting approval. "I think about the generational transformations" where there is a growing distrust over "what used to be norms," Crawford said. This includes the need for computer scientists, data analysts, data strategists, contract writers "proficient in writing cloud and AI contracts," and lawyers "who understands ethics associated with AI," he said. "Among the hardest thing we're going to implement in the next 10 years is the data strategy," Crawford said.