Blog

Log4J – Log4Shell – The latest threat and what you can do about it

What Happened and When? In early December, LunaSec published a blog post with details regarding a vulnerability in the log4j2 library. This vulnerability became quickly known as “log4shell”, and CVE-2021-44228 was assigned to it. Since then, Stratix Systems Cybersecurity Experts have been tracking threats taking advantage of CVE-2021-44228. CVE-2021-44228 has the highest criticality rating of

Log4J – Log4Shell – The latest threat and what you can do about it Read More »

Have you been hacked yet? Chances are, you will be.

With the growing complexity of legal work that is increasingly cross-practice, law firms must collaborate across expertise and organizational boundaries and technology connects that collaboration. Between computer viruses, hackers, ransomware attacks, virtual break-ins and data theft, organizations have a lot to worry about these days. The attacks are everywhere, and cybersecurity is more important than

Have you been hacked yet? Chances are, you will be. Read More »

Congratulations to our 2021 3rd Quarter Core Values Recognition Award Winners!

At Stratix Systems, we value our employees and appreciate all their hard work and dedication. Each quarter, we recognize members of our team who are nominated by their peers for living out our Core Values – Responsiveness, Consistency, Integrity, Environment, Continual Improvement and Community Focus. Please join me in congratulating our 2021 3rd Quarter Core

Congratulations to our 2021 3rd Quarter Core Values Recognition Award Winners! Read More »

Stratix System’s Top 25 Practices for Basic Cyber Hygiene

Stratix System’s Top 25 Practices for Basic Cyber Hygiene Stratix Systems created this list of 25 practices for basic network hygiene to help our clients prioritize where to focus first when establishing best practices for cybersecurity. Policies and procedures are important, but practices are where it all starts. Once these initial practices are completed, you

Stratix System’s Top 25 Practices for Basic Cyber Hygiene Read More »

Scroll to Top