Urgent Security Notices Issued for Microsoft’s PrintNightmare

Sophie Van Remortel
| Digital Marketing & Content Coordinator

WINDOWS USERS ARE AT RISK

 

Early the week of July 6th, US-CERT, CISA, and Microsoft issued urgent security notices regarding the PrintNightmare vulnerability. PrintNightmare is a remote code execution exploit that can quickly take over a network and create major security problems by allowing hackers to install programs, view/delete data, and even create new user accounts with full user rights.

Microsoft has already released patches for the vulnerability on many versions of Windows systems and strongly recommends Windows users to check for updates and install immediately as they become available to protect devices against remote attacks.

Prior to the released patches, SWICKtech’s Security and Operations Center (SOC) deployed protection to all impacted customers. As updates are released, clients under support contracts for cybersecurity will automatically receive patches.

SWICKtech will continue to monitor the details of the vulnerability, keeping networks and data security our top priority. Additional information from Microsoft can be found here.

If you have questions or concerns about the impact of this threat to your business, please reach out to SWICKtech here.

Stop potential hackers in their tracks.

Related Blogs

Payroll Diversion Fraud Is Targeting Employees

Payroll Diversion Fraud Is Targeting Employees

Costly direct deposit theft scams are on the rise How does it work? Cyber criminals are after employee paychecks that ... Read More >
SWICKtech’s New Cybersecurity Agreement Makes Implementing New Cyber Insurance Requirements Easy

SWICKtech’s New Cybersecurity Agreement Makes Implementing New Cyber Insurance Requirements Easy

You may not know your business is at risk until it's too late The landscape of Information Technology (I.T.) has ... Read More >
What Is the Log4J Vulnerability?

What Is the Log4J Vulnerability?

Log4J is a free and open-source logging library widely used by companies large and small. Officially designated CVE-2021-44228, the 0-day ... Read More >