CUPS Vulnerabilities Underscore the Need for Proper System Configuration Beyond Edge Security

Monday, October 14, 2024

Recent vulnerabilities identified in the Common Unix Printing System (CUPS), specifically CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177, highlight the importance of not just securing the network perimeter but also ensuring proper system configuration. While edge security measures such as firewalls and intrusion detection systems (IDS) are crucial in protecting Linux servers from external threats, they are… Read more »

Zero Trust Architecture for Linux: A New Era of Security for Modern Infrastructure

Wednesday, September 4, 2024

The security paradigm is shifting as organizations increasingly adopt cloud, containerization, and microservices architectures. Traditional security models, which rely on a strong perimeter to protect the internal network, are becoming obsolete. In this new digital era, where workloads and users operate from anywhere, security must move closer to the workload. This is where Zero Trust… Read more »

The Inevitability of Cybersecurity Breaches: A Reflection on the XZ/LibLZMA Vulnerability

Thursday, April 4, 2024

The recent revelation of a significant vulnerability within xz’s liblzma library has brought to light a critical truth in cybersecurity: It’s not a matter of if a security breach will occur, but when. This incident serves as a poignant reminder that, despite rigorous security measures and proactive risk management strategies, vulnerabilities can and will be discovered within the… Read more »

The Rising Tide of Cyber Crime Targeting Small Businesses

Friday, March 22, 2024

Cybersecurity has become a paramount concern for organizations worldwide. As larger enterprises have fortified their defenses against cyber threats, small businesses have emerged as more vulnerable targets for cybercriminals. This shift is primarily due to the limited resources small businesses can allocate to cybersecurity measures compared to their larger counterparts. The implications of this trend… Read more »

Convert RedHat to CentOS And Save Money Today!

Thursday, July 25, 2019

Discussing how to convert RedHat to CentOS has been an increasingly common topic with IBM’s acquisition of RedHat. Many organizations are reviewing their RedHat agreements and asking themselves what they get from their RedHat licensing and support dollars. RHEL resellers are also concerned that their biggest competitor and RedHat reseller (IBM) is now in complete… Read more »

Disaster Planning & Overnight FedEx Added To Our Off-Site Backup Service

Thursday, February 9, 2017

A-Team Systems is excited to announce two excellent improvements to our off-site backup service! Not only does our service outperform Amazon S3 by over 4x, we now offer more than just backup storage and operations. These additions advance our off-site backup service into a full fledged disaster recovery system. Disaster Planning We now include full… Read more »

FreeBSD 11.0 Deployment Soon!

Thursday, November 17, 2016

FreeBSD 11 was formally released last month and we’re very excited to start rolling it out to our clients in the coming weeks. FreeBSD 11.0 brings a host of new features and improvements including: Improved BHyve: BHyve is FreeBSD’s type-2 native hypervisor which boots virtually any FreeBSD and Linux version and now includes a native… Read more »

Continuous Port Scanning and Mail Real-time Blackhole List Monitoring

Tuesday, May 17, 2016

A-Team Systems proudly announces another addition to its maintenance and monitoring plans: continuously scanning all of our client’s public-facing infrastructure for open network ports as well as being listed on mail RBLs (real-time blackhole lists). Server Scanning One off port scanning when a system is put into place is normal practice for systems and network… Read more »

Systems Administration Retainers

Thursday, March 10, 2016

A-Team Systems has formally rolled out monthly retainer plans which represent a significant discount over our standard hourly pricing for clients who are regularly expanding and adding new projects to their infrastructure. These plans compliment our existing monthly maintenance and monitoring plans giving you complete predictability and cost management. Retainer hours can be allocated to… Read more »

Certificate Transparency Monitoring

Thursday, November 5, 2015

A-Team has rolled out another improvement to our monitoring service: Certificate Transparency (CT) monitoring. In short we now use the CT system to continuously watch for certificate authorities issuing certificates against domains we monitor for our clients. When we see a certificate being issued we ensure that it was done so with proper authorization from… Read more »

A-Team Systems