<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TechAssist® Global</title>
	<atom:link href="https://www.techassist.io/feed" rel="self" type="application/rss+xml" />
	<link>https://www.techassist.io</link>
	<description>Business IT Services</description>
	<lastBuildDate>
	Sat, 01 Apr 2023 20:27:09 +0000	</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.1.22</generator>

<image>
	<url>https://www.techassist.io/wp-content/uploads/2015/03/cropped-man-32x32.png</url>
	<title>TechAssist® Global</title>
	<link>https://www.techassist.io</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What is Supply Chain Security and How It Affects Your Business</title>
		<link>https://www.techassist.io/topics/cybersecurity/how-chain-security-affects-business</link>
				<pubDate>Tue, 17 Jan 2023 05:44:21 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.techassist.io/?p=4945</guid>
				<description><![CDATA[<p>Supply chain security is the process of protecting an organization's intellectual property, sensitive information, and other assets from being compromised by foreign intelligence agencies, or other malicious actors, through the use of on-shore front companies.</p>
<p>The post <a href="https://www.techassist.io/topics/cybersecurity/how-chain-security-affects-business">What is Supply Chain Security and How It Affects Your Business</a> first appeared on <a href="https://www.techassist.io">TechAssist® Global</a>.</p>]]></description>
								<content:encoded><![CDATA[<p>Supply chain security is the process of protecting an organization&#8217;s intellectual property, sensitive information, and other assets from being compromised by foreign intelligence agencies, or other malicious actors, through the use of on-shore front companies.</p>



<span id="more-4945"></span>



<h2>Threats from Malicious Foreign Actors</h2>



<p>Foreign intelligence agencies may use on-shore front companies to infiltrate an organization&#8217;s supply chain and steal sensitive information or intellectual property. These front companies may pose as legitimate vendors or suppliers and may have access to an organization&#8217;s systems and networks, providing a potential pathway for data exfiltration or other malicious activity.</p>



<h2>How To Protect Your Business</h2>



<p>To protect against supply chain threats, organizations can implement several measures, such as:</p>



<ul><li>Risk assessment: Conduct regular risk assessments of all vendors and suppliers, including on-shore front companies, to identify potential vulnerabilities and threats.</li><li>Due diligence: Conduct thorough due diligence on all vendors and suppliers, including background checks and investigations to verify their legitimacy and identify any potential red flags.</li><li>Third-party security: Imposing security requirements on all vendors and suppliers, including on-shore front companies, and regularly monitoring their compliance with those requirements.</li><li>Segmentation: Segmenting an organization&#8217;s network and systems to limit the potential impact of a compromise.</li><li>Incident response: Having an incident response plan in place to quickly detect and respond to any supply chain security breaches.</li></ul>



<p>It&#8217;s important to note that supply chain security is a complex and multifaceted issue, and implementing a comprehensive security program that covers technical solutions, employee awareness and incident management, is crucial to effectively manage and mitigate the risks of supply chain attacks.</p>



<p>Proper supply chain security is a process of protecting an organization&#8217;s intellectual property, sensitive information, and other assets from being compromised by foreign intelligence agencies or other malicious actors through the use of on-shore front companies. Organizations can protect themselves by implementing measures such as risk assessment, due diligence, third-party security, network segmentation, and incident response.</p>



<h2>Export Controls Protect Your Brand &#8212; Know Your Customer</h2>



<p>Export controls are government regulations that are designed to prevent sensitive technology, goods, and services from falling into the hands of foreign countries or entities that may use them for military or other harmful purposes. These controls are put in place to protect national security and foreign policy interests, as well as to prevent the proliferation of weapons of mass destruction.</p>



<p>When it comes to technology, export controls can be used to restrict the export of certain items, such as software, hardware, and technical data, to certain countries or end-users. This can help to prevent sensitive technology from ending up in foreign weapons systems or other military applications.</p>



<p>There are several different types of export controls that organizations need to be aware of:</p>



<ul><li>Dual-use controls: These are controls that apply to items that have both civilian and military applications, such as certain software, hardware, and technologies.</li><li>Embargo controls: These are controls that prohibit the export of certain items to specific countries or regions, such as those under sanctions or in a state of war.</li><li>End-use controls: These are controls that prohibit the export of certain items to specific end-users, such as foreign military organizations or other prohibited end-users.</li></ul>



<p>Organizations that export technology or other controlled items must comply with these regulations and obtain the necessary licenses or authorizations. Failure to comply can result in severe penalties, including fines and imprisonment.</p>



<p>To avoid the risks associated with exporting controlled items, organizations can implement a number of best practices, such as:</p>



<ul><li>Conducting regular compliance reviews and audits to ensure that all exports are in compliance with export control regulations</li><li>Establishing compliance procedures and training programs to ensure that employees are aware of export control regulations and know how to comply with them</li><li>Implementing measures to track and control the export of controlled items, including software, hardware, and technical data</li><li>Utilizing third-party services such as compliance consulting, compliance management software, and compliance training to help manage export control compliance</li></ul>



<h2>Conclusion</h2>



<p>Export controls are government regulations designed to prevent sensitive technology, goods and services from falling into the hands of foreign countries or entities that may use them for military or other harmful purposes. Organizations that export technology or other controlled items must comply with these regulations and obtain the necessary licenses or authorizations, failure to comply can result in severe penalties. Organizations can implement best practices such as regular compliance reviews, establishing compliance procedures and training programs, implementing measures to track and control the export of controlled items, and utilizing third-party services to help manage export control compliance.</p>



<figure class="wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio"><div class="wp-block-embed__wrapper">
<iframe title="Protected Voices: Supply Chain" width="1080" height="608" src="https://www.youtube.com/embed/b9CTMA15C2g?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe>
</div></figure>



<div class="wp-block-button aligncenter"><a class="wp-block-button__link has-background" href="https://www.techassist.io/contact-us/" style="background-color:#1f2095">Schedule a Consultation</a></div><p>The post <a href="https://www.techassist.io/topics/cybersecurity/how-chain-security-affects-business">What is Supply Chain Security and How It Affects Your Business</a> first appeared on <a href="https://www.techassist.io">TechAssist® Global</a>.</p>]]></content:encoded>
										</item>
		<item>
		<title>Potential for New Weapons Targeting Atomic Clocks</title>
		<link>https://www.techassist.io/topics/cybersecurity/weapons-targeting-atomic-clocks</link>
				<pubDate>Tue, 17 Jan 2023 02:15:32 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Cybersecurity]]></category>

		<guid isPermaLink="false">https://www.techassist.io/?p=4930</guid>
				<description><![CDATA[<p>Explore the topic of atomic clock security and learn about the potential consequences of a future attack on these essential timekeeping devices.</p>
<p>The post <a href="https://www.techassist.io/topics/cybersecurity/weapons-targeting-atomic-clocks">Potential for New Weapons Targeting Atomic Clocks</a> first appeared on <a href="https://www.techassist.io">TechAssist® Global</a>.</p>]]></description>
								<content:encoded><![CDATA[<h2>Atomic Clocks and Network Time Protocol (NTP)</h2>



<p><a href="https://en.wikipedia.org/wiki/NIST-F1" target="_blank" rel="noreferrer noopener" aria-label="Atomic clocks (opens in a new tab)">Atomic clocks</a> are incredibly precise timekeeping devices that rely on the natural vibrations of atoms to keep time. They are used in a wide range of technologies, including GPS navigation, cell phone communication, and power grid synchronization. Atomic clocks are important because they provide a highly accurate and stable time reference that is essential for many modern technologies.</p>



<span id="more-4930"></span>



<p>One of the most important technologies that rely on atomic clocks is the Network Time Protocol (NTP). NTP is a system that allows computers to synchronize their clocks with a highly accurate time source. This is done by connecting to NTP servers, which in turn are connected to atomic clocks.</p>



<p>In order to ensure that NTP is as accurate as possible, the servers are organized into a hierarchy called &#8220;stratum levels.&#8221; At the highest level, stratum 0, are the atomic clocks themselves. These clocks provide the most accurate time reference available. The servers connected to them are called stratum 1 servers, and they provide time reference to stratum 2 servers, which in turn provide time reference to stratum 3 servers and so on.</p>



<p>In this way, every computer in the world can synchronize its clock with an atomic clock, even if it is not directly connected to one. The NTP network ensures that all computers have access to the most accurate time reference possible, which is essential for many modern technologies.</p>



<p>It&#8217;s worth mentioning that with the increasing use of GPS, many devices can now synchronize their time with GPS satellites, which are also connected to atomic clocks. This way, devices can use GPS to synchronize their time with atomic clocks without being connected to the internet or a local NTP server.</p>



<p>If a weapon that could target and disrupt atomic clocks were invented, the consequences would be severe and widespread. Atomic clocks are used in a wide range of essential technologies, including GPS navigation, cell phone communication, and power grid synchronization. Disrupting these clocks would cause widespread chaos and disruption.</p>



<h2>Some of the most notable impacts would be:</h2>



<p>• <a href="https://www.nist.gov/industry-impacts/navigation-through-timekeeping" target="_blank" rel="noreferrer noopener" aria-label="Navigation errors (opens in a new tab)">Navigation errors</a><a rel="noreferrer noopener" aria-label="Navigation errors: (opens in a new tab)" href="https://www.gps.gov/applications/timing/" target="_blank">:</a> Without synchronized time, GPS navigation systems would be unable to provide accurate location information. This would make it difficult or impossible to navigate by car, boat, or plane, putting lives at risk.</p>



<p>• <a href="https://fieldlogix.com/news/navy-accidentally-jammed-gps-system-in-san-diego/" target="_blank" rel="noreferrer noopener" aria-label="Communication breakdowns (opens in a new tab)">Communication breakdowns</a>: Without synchronized time, cell phone networks and other communication systems would be unable to synchronize their signals. This would make it difficult or impossible to make phone calls or send text messages, disrupting personal and business communication.</p>



<p>• Power outages: Without synchronized time, power grid synchronization systems would be unable to ensure that power is distributed evenly across a network. This could cause power outages, potentially putting lives at risk, especially for people that depend on power for medical equipment or other critical needs.</p>



<p>• <a href="https://qz.com/1106064/the-entire-global-financial-system-depends-on-gps-and-its-shockingly-vulnerable-to-attack" target="_blank" rel="noreferrer noopener" aria-label="Financial losses (opens in a new tab)">Financial losses</a>: Without synchronized time, financial systems would be unable to ensure that transactions are processed correctly. This could cause errors in these systems, leading to financial losses.</p>



<p>• <a href="https://securityintelligence.com/posts/attack-against-time/" target="_blank" rel="noreferrer noopener" aria-label="Cybersecurity issues (opens in a new tab)">Cybersecurity issues</a>: Without synchronized time, cyber-security systems would be unable to timestamp log files and detect intrusions, making it harder to detect and prevent cyber-attacks.</p>



<p>• Business operations: Many businesses rely on accurate time for scheduling and coordination, such as transportation, manufacturing, retail, and many more. Without synchronized time, these businesses would struggle to operate efficiently and effectively.</p>



<p>• Scientific research: Many scientific experiments and observations depend on accurate time measurements, for example, astronomical observations and weather forecasting. Without synchronized time, these research efforts would be hindered.</p>



<p>Disrupting atomic clocks would have a cascading effect on other systems that rely on time. For example, online services like e-commerce platforms, social media, and even search engines would be affected. </p>



<p>In closing, without synchronized time, many aspects of modern life would be affected, leading to chaos, confusion, and disruption. The importance of synchronized time cannot be overstated, and it is essential for the functioning of modern society.</p>



<div class="wp-block-button aligncenter"><a class="wp-block-button__link has-background has-vivid-cyan-blue-background-color" href="https://www.linkedin.com/company/techassist/">Follow TechAssist® Global on LinkedIn</a></div><p>The post <a href="https://www.techassist.io/topics/cybersecurity/weapons-targeting-atomic-clocks">Potential for New Weapons Targeting Atomic Clocks</a> first appeared on <a href="https://www.techassist.io">TechAssist® Global</a>.</p>]]></content:encoded>
										</item>
		<item>
		<title>Microsoft Defender January 2023 Update Deletes Start Menu and Icons</title>
		<link>https://www.techassist.io/topics/news/microsoft-defender-january-update-deletes-start-menu-and-icons</link>
				<pubDate>Sat, 14 Jan 2023 02:05:18 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">https://www.techassist.io/?p=4914</guid>
				<description><![CDATA[<p>Microsoft Defender is a built-in antivirus program for Microsoft Windows, which automatically updates itself to ensure that users&#8217; devices are protected against the latest security threats. However, the latest update for Microsoft Defender has caused some users to experience a major problem: the deletion of their start menu and icons. Users have taken to forums [&#8230;]</p>
<p>The post <a href="https://www.techassist.io/topics/news/microsoft-defender-january-update-deletes-start-menu-and-icons">Microsoft Defender January 2023 Update Deletes Start Menu and Icons</a> first appeared on <a href="https://www.techassist.io">TechAssist® Global</a>.</p>]]></description>
								<content:encoded><![CDATA[<p><a href="https://www.microsoft.com/en-us/security/business/microsoft-defender" target="_blank" rel="noreferrer noopener" aria-label="Microsoft Defender (opens in a new tab)">Microsoft Defender</a> is a built-in antivirus program for Microsoft Windows, which automatically updates itself to ensure that users&#8217; devices are protected against the latest security threats. However, the latest update for Microsoft Defender has caused some users to experience a major problem: the deletion of their start menu and icons.</p>



<span id="more-4914"></span>



<p>Users have taken to <a href="https://www.reddit.com/r/sysadmin/comments/10arfxt/potentially_faulty_virus_definition_update/" target="_blank" rel="noreferrer noopener" aria-label="forums and social media (opens in a new tab)">forums and social media</a> to report this issue, stating that after the update, their start menu and icons are missing, and they are unable to access their apps and settings. Some users have also reported that their taskbar and desktop background have disappeared as well.</p>



<p>Microsoft has acknowledged the issue and is working on a fix. In the meantime, affected users are advised to restore their system to a previous state before the update was installed. This can be done by going to the Settings app, selecting &#8220;Update &amp; Security,&#8221; and then selecting &#8220;Recovery.&#8221; From there, users can choose to go back to a previous version of Windows.</p>



<p>Additionally, if the issue persists, users can also contact Microsoft support for assistance. They can provide detailed information about the problem and receive guidance on how to resolve it.</p>



<p>Overall, this is a frustrating problem for users who rely on the start menu and icons for everyday use, and it highlights the importance of having a recent backup of your system before installing any updates.</p>



<p>Forum posts indicate one potential mitigation is to set Microsoft Defender ASR rule <strong>92e97fa1-2edf-4476-bdd6-9dd0b4dddc7b</strong> to audit only.</p>



<p><strong>Continuing Coverage:</strong> <a rel="noreferrer noopener" aria-label="https://www.theregister.com/2023/01/13/happy_friday_13th_microsoft_defender/ (opens in a new tab)" href="https://www.theregister.com/2023/01/13/happy_friday_13th_microsoft_defender/" target="_blank">https://www.theregister.com/2023/01/13/happy_friday_13th_microsoft_defender/</a></p><p>The post <a href="https://www.techassist.io/topics/news/microsoft-defender-january-update-deletes-start-menu-and-icons">Microsoft Defender January 2023 Update Deletes Start Menu and Icons</a> first appeared on <a href="https://www.techassist.io">TechAssist® Global</a>.</p>]]></content:encoded>
										</item>
	</channel>
</rss>
