The US Cybersecurity and Infrastructure Security Agency has added eight new vulnerabilities to it’s Known Exploited Vulnerabilities Catalog.
CISA Adds Eight Known Exploited Vulnerabilities to Catalog | CISA
My advice: Either you or your IT support need to check whether these issues impact your systems. You need to have a master document that details your systems, hardware, software, online, networks, back-ups, suppliers etc – so when cyber security (or operational) issues arise you and your support teams can quickly check if you are affected. From there you can take fast, effective action.
Please Note:
I am on leave so the news this week is “in brief”. You can still contact me via the contact page and Octagon Technology.