Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Homeland Security is Warning Businesses to Update Google Chrome

Homeland Security is Warning Businesses to Update Google Chrome

We realize that it’s one thing for us to tell you how important it is to update your software. After all, we’re tech guys, so we worry about that kind of thing all the time. Hopefully, it’s quite another matter when Homeland Security does it, which is why we’re really hoping that you take heed of this warning and update Google Chrome.

Homeland Security Warns of Current Attacks Via Chrome

So far this month, there have been no fewer than five vulnerabilities patched in the Chrome web browser, all of which have been zero-day threats.

A zero-day threat is one that attackers have begun to leverage before a software developer or security researcher has managed to identify it. As a result, the attacker using a zero-day attack has the advantage of an early start, leaving the vendor playing catch-up. This makes zero-day threats particularly dangerous to begin with.

What’s worse, the last two zero-day threats that influence Chrome have been deemed to be high severity attacks. While the full details of these threats have not yet been released to the public, we do know that CISA—the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency—has stated that the vulnerabilities these threats are composed of could enable an attacker to take over an affected system. One of them, tied to a JavaScript engine, would most likely be used in a phishing attack, while the other is more likely to be a corruption vulnerability in one of Chrome’s features.

Regardless, these vulnerabilities have already been spotted in active use, and so CISA is also encouraging users to apply the updates that Google has released to resolve these issues.

Why Applying Updates is So Important

Let me ask you this: if the front door of your business suddenly couldn’t be locked properly, would you just leave it like that and hope for the best, or would you fix it immediately?

Either one of these vulnerabilities are akin to the broken lock, and too many users unwittingly elect to take the first option. For instance, when Google mitigated one of these vulnerabilities with an update, only half of Android users updated their version of Chrome within a day. Whether this is simply negligence or the use of an out-of-date device, it leaves serious vulnerabilities open to attack.

As a managed service provider, 415 IT is here to help. Part of our service is to ensure that these kinds of patches and fixes are applied in an appropriately timely manner. If you need assistance with securing your business’ IT or with any other aspect of your technology management, reach out to us to find out what we can do for you. Call (415) 295-4898 today.

A Look at Modern Networking
Knowing Your Technology Means Knowing What to Expe...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 19 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Business Computing Best Practices Data IT Support Data Backup Network Security Privacy Hosted Solutions Cloud IT Services Efficiency Software Data Recovery Internet Email Managed IT Services Business Mobile Device Phishing Collaboration Small Business Malware Google User Tips Innovation Outsourced IT Hackers Cloud Computing Cybersecurity Upgrade Smartphone Business Management Hardware Tech Term Communication Managed Service Mobile Devices Android Computer Microsoft Workplace Tips Business Continuity Windows 10 VoIp Smartphones Covid-19 Backup Quick Tips Disaster Recovery Ransomware Paperless Office Managed Service Provider Remote Work Communications Encryption Network Wi-Fi Passwords Data Management Server Office 365 Business Technology Users Saving Money Browser Remote Monitoring Artificial Intelligence Managed IT Help Desk BDR Social Media Internet of Things Document Management Government Compliance Vulnerability Windows 7 Save Money Holiday Healthcare Data Security Automation Miscellaneous Laptops Scam Applications Blockchain Facebook Chrome Microsoft Office Windows Managed IT services Virtualization Tip of the week Analytics Health Bandwidth Remote Project Management Processor Vendor Management Gadgets Avoiding Downtime Office Two-factor Authentication Antivirus Redundancy Employer-Employee Relationship Wireless Information Mobile Office Mobility Website Proactive Meetings Company Culture IT Management IoT Data Loss Regulations BYOD Customer Relationship Management Hard Drive Maintenance VPN Infrastructure Employee-Employer Relationship Networking Software as a Service Net Neutrality Information Technology Storage Router OneDrive Managed Services Apps Training Machine Learning Files Access Control Virtual Private Network RMM Recycling Holidays Word Monitoring Patch Management Data Breach Password Co-Managed IT Server Management Mobile Security Remote Worker Flexibility Unified Communications Financial WiFi Remote Monitoring and Management Operating System Assessment File Management Management Alert The Internet of Things Network Management Electronic Health Records Gmail Employees File Sharing Consulting Downtime Cooperation Consultation Payment Cards Instant Messaging Spam Risk Management Money Display Data Storage Managed Services Provider HIPAA Utility Computing Bring Your Own Device Search Time Management Remote Workers Tablet Social Network Professional Services Internet Exlporer Remote Computing Dark Web Augmented Reality Unified Threat Management Smart Technology Computing Vendor Development Travel Batteries Content Filtering Printing SharePoint Virtual Reality GDPR Shadow IT Human Error Transportation Active Directory Bluetooth E-Commerce Theft IT Technicians Cost Management Mail Merge User Error Firewall Wireless Internet Recovery Big Data Authentication Motherboard Chromebook Superfish Electronic Medical Records Connectivity Comparison Licensing Smart Devices Hacker Wasting Time Current Events Outsource IT Cookies Cables Technology Tips CIO applications Migration eWaste Downloads Data Warehousing Outsourcing OneNote Permission Legislation Windows Server Peripheral Features Address Distributed Denial of Service Employer/Employee Relationships IT Apple Authorization Vulnerabilities Specifications Hard Disk Drives Optimization Sensors Politics Managing Stress Database Websites Laptop Nanotechnology Wires Techology Digital Payment Hotspot Banking Private Cloud Chatbots Notes Operations Video Conferencing How To Test User Management PCI DSS Procurement Mirgation Managed IT Service Proactive Maintenance Business Telephone Solid State Drive WPA3 Mobile Computing Wearable Technology Star Wars Technology Laws Black Friday Solid State Drives Virtual Machines Enterprise Content Management Voice over Internet Protocol Projects SaaS Remote Working App Outlook Disaster Resistance Mouse Language Value of Managed Services Reviews Bookmarks ROI Identity Theft Enterprise Resource Planning Emergency Multi-Factor Security PowerPoint Biometric Teamwork Touchscreen Hacking Cyberattacks Social Cache Printer Break Fix Cybercrime IT Assessment Cyber security Fleet Tracking Zero-Day Threat Geography Mobile Device Management Unified Threat Management Cyber Monday Staff Options Credit Cards Telephone Customer Service Social Networking Permissions Return on Investment Budget Screen Reader Shortcut Proactive IT Computing Infrastructure End of Support Favorites Identity Microsoft Excel Heating/Cooling Gamification Shared resources Going Green Trending CRM Read Only Security Cameras Database Management Digitize Asset Tracking Backup and Disaster Recovery Modem High-Speed Internet Personal Information Statistics Point of Sale Tech Terms Tech Support 5G Computers Mobile VoIP MSP Finance G Suite Lenovo Google Calendar Fraud Settings Smart Tech IT Consulting Alerts Manufacturing Windows Server 2008 Gifts Conferencing Mobile Samsung Virtual Assistant Bitcoin Servers Printers Marketing Education Twitter CES CEO Students Regulation Daniel Stevens

Latest Blog

It isn’t often that you’ll hear a managed service provider say something like, “There’s no school like the old school.” In many ways, however, the basic principles of a solid business IT strategy haven’t changed all that much… despite the momentous changes that we’ve witness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...