NEWS FROM THE EDGE

Tech Tips and Advice from the Experts at Dynamic Edge

Urgent: Uninstall QuickTime for Windows Now! The Latest On Patching Your Computers and Keeping Your Networks Safe

QuickTime Windows security vulnerability

If you’re a Microsoft Windows user and still have Apple QuickTime installed on your machine, you need to remove it immediately. Apple has ceased updates for it and the Department of Homeland Security’s U.S. Computer Emergency Readiness Team (US-CERT) has strongly advised QuickTime to be removed from Windows machines. The recommendation comes after researchers reported two new critical security holes in QuickTime—vulnerabilities that won’t be patched!

And you’ve probably been at risk for some time. At first, the recommendation to cease use of QuickTime was in response to a recent report that Apple will no longer be providing security updates for the Windows version. But many security organizations, including US-CERT, have recently discovered that Apple stopped updating the QuickTime for Windows software for some time. In fact, the tech company deprecated all developer APIs for QuickTime on Windows back in 2013.

Apple has also shipped an update to QuickTime for Windows in January of this year to remove the browser plugin, which should alleviate browser-based attacks to the QuickTime vulnerability. Nevertheless, if you still have QuickTime on your machine, get rid of it!

For current clients of Dynamic Edge, rest assured we’ve scanned all of your systems and have removed this QuickTime threat immediately after the news broke. Your systems are constantly being monitored by highly trained cybersecurity experts that identify and fix threats before they become enormous system breaches for you and your business.

But if you’re not a Dynamic Edge client and don’t have a detailed and expert team at the ready to identify and fix your security risks…

Your QuickTime App May Be Just The Tip Of The Iceberg When It Comes To Leaving Your Network Wide Open To Attacks!

You really need a dedicated security process to ensure your network and team are safe from attacks. We’ve found that our optimized 6-step security process ensures that your entire business is safe:

  1. Identify—We Identify and assess potential network threats daily. That entails constantly learning about new hacking procedures, keeping on top of all published system vulnerabilities and the latest cyber attack attempts.
  2. Monitor—We constantly monitor your network systems 24/7/365 to make sure EVERYTHING is running normally.
  3. Updates and Patches—We make sure your entire network is patched and secured daily.
  4. Remove Threats—When we identify a vulnerability—from the latest cybersecurity news or an event that we might observe as suspicious—we make sure ALL our clients are protected against the threat. Since we work with diverse clients, we see and are up-to-speed on an enormous amount of security threat information. Our dearth of knowledge enables us to act quickly and strategically to best prevent any looming attacks.
  5. Constant Backup—We make sure your computers are ALWAYS being backed up. That way, in the event something does go wrong, you are back up and running quickly.
  6. Inform Users—One of our core values is communication and we take informing users of cyber threats as one of the greatest ways to keep your organization safe from attacks.

You don’t have time to create a network security process that continually monitors your business’ networks for new or upcoming threats. The reality is network security is something we do REALLY well and a piece of mind we provide to clients like you every day.

If you’re concerned your network security isn’t up-to-date, constantly monitored and backed up and that your end users are properly trained and informed of the latest security threats, please contact us TODAY! Every day left unprotected is another day you leave the door wide open to some ambitious hacker wanting to steal or ransom your data.

Comments are closed.