ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: 27 Major Vulnerabilities Fixed By Microsoft. Is Your System Protected?

Alert: 27 Major Vulnerabilities Fixed By Microsoft. Is Your System Protected?

Microsoft’s latest round of security patches includes 27 software vulnerabilities, many of which are critical in nature. Affected are widely-used titles such as Windows, Microsoft Office, Internet Explorer, and the new Edge browser. It’s important for users to take action and install the Microsoft-provided patches, and soon.

Users who are on-the-ball enough to have already applied the patches will be glad they did. If this is you, then the following information is concerning what you’re protected from. On the other hand, users who haven’t yet applied the patches will want to take note of how their computers are currently at risk.

The vulnerabilities connected with Microsoft Office, Internet Explorer, and Edge are critical. Hackers can exploit these apps remotely through web pages or Office documents, allowing them to execute malicious code. To learn more about the nature of these vulnerabilities, see these official security bulletins from Microsoft:

Patch for Microsoft Office: MS16-099
Patch for Internet Explorer: MS16-095
Patch for Edge: MS16-096

Additional critical vulnerabilities have been found affecting Windows, Microsoft Office, Skype, and Lync. These vulnerabilities concern the Windows Graphics Component, letting hackers execute remote code via malicious documents and web pages.

Patch for Windows, Microsoft Office, Skype, and Lync: MS16-097

Microsoft has also resolved a critical vulnerability affecting the remote code execution with Windows PDF Library. This is concerning since PDF Library comes bundled with Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2012, and Windows Server 2012 R2. Specifically with Edge, the cause for concern has to do with hackers being able to exploit malicious PDF documents hosted on a website that they can then use to trick users to download.

Patch for Windows PDF Library: MS16-102

Microsoft has also provided patches for additional vulnerabilities that they have flagged “important” (a step down from critical). Despite these threats being less severe, you will still want to install the security patches and take care of them.

MS16-101
MS16-100
MS16-098

Have you already taken action and applied these security patches? Those who haven’t should do so immediately and ClearView IT can help with the needed security updates to make sure you're protected. Call us at 866-326-7214 to arrange a time for us to do this.

Although, businesses that already have ClearView IT manage their network don’t have to worry about this latest round of patches, or any in the future, thanks to our remote monitoring and maintenance service. So, sit back and bask in the comfort of knowing that you’re protected.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Network Mobile Devices Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media VoIP Users Mobile Device Automation Tech Term Business Continuity Facebook Windows 10 Passwords Holiday Disaster Recovery Covid-19 Managed Service Windows 10 IT Support Browser Apps Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Artificial Intelligence Managed IT services Gadgets Networking Workplace Strategy Windows App Virtualization Spam WiFi Business Technology Blockchain Bandwidth Encryption Server Mobile Device Management Information Remote Employee/Employer Relationship Office Apple Two-factor Authentication Information Technology Office 365 Budget Gmail History Health BDR Analytics Cybercrime Wi-Fi Conferencing Access Control Data Security Big Data Help Desk Vendor Hacking Cost Management Remote Monitoring Remote Computing Voice over Internet Protocol Document Management Hacker IT Management Save Money Training Compliance Patch Management Employer-Employee Relationship Applications Retail Alert Project Management Vulnerabilities Hiring/Firing Outlook Legal Password Mobile Office Data storage Money Managed Services Customer Service Unified Threat Management Firewall Data loss Augmented Reality Word BYOD Search... IBM Website Computing Best Practice Vendor Management Hard Drive Antivirus The Internet of Things YouTube Maintenance Twitter Windows 11 Monitoring User Law Enforcement End of Support Laptop Healthcare Printer Websites Remote Workers Meetings Mobility Windows 7 Chrome Free Resource Google Maps Sports Travel Scam Social SaaS DDoS Virtual Reality How To Social Engineering Cryptocurrency Mobile Computing Black Market VPN iPhone Cleaning Education Marketing Cortana Robot Update Content Filtering Running Cable Data Breach Storage Router Paperless Office Chromebook Drones Cooperation Automobile Video Conferencing Physical Security Virtual Machines How To HIPAA Computer Repair Multi-factor Authentication Wireless Technology Microchip eWaste Start Menu Professional Services Flexibility Computer Care Downloads Vulnerability Saving Time Downtime Hack Safety Identity Theft Software as a Service Managed Services Provider Notifications Unified Communications Data Protection Computers Bitcoin Virtual Desktop Virtual Private Network Telephone Experience Google Docs Bluetooth Current Events Distributed Denial of Service PowerPoint Office Tips Administration Private Cloud Memory Excel Solutions Presentation Specifications Disaster Tech Terms Images 101 Integration IT Consultant Display Managed IT Politics Machine Learning Customer Relationship Management Settings Lithium-ion battery Digital Virtual Assistant Co-Managed IT Employees Entertainment Solid State Drive Taxes Avoiding Downtime Processors Holidays Processor File Sharing Virtual Machine Username Monitors Redundancy Reviews Visible Light Communication Startup Optimization Freedom of Information Smart Technology Reading Teamwork Navigation 2FA Windows 8 Cache Addiction email scam Data Storage Workers Mobile Security Hypervisor Troubleshooting Unified Threat Management Public Speaking Displays User Tip Shopping Advertising Legislation News Medical IT Relocation SQL Server Streaming Media Work/Life Balance Printing Evernote Paperless Tech Support Network Management CCTV Touchscreen PCI DSS Licensing Keyboard Hard Drives Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Computing Infrastructure Azure In Internet of Things Business Communications intranet Vendor Mangement Service Level Agreement Internet Service Provider Management Regulations Compliance Samsung Device security Managed IT Service Business Owner Wireless Hacks Shortcut Network Congestion Heating/Cooling Writing Environment Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Reliable Computing Business Cards Windows XP Tech Human Resources Social Networking Business Mangement Going Green Net Neutrality Error Financial Data Tablets Bookmark Risk Management IT Scams Scalability Supercomputer Piracy Administrator Text Messaging Google Calendar Term Google Apps Proactive IT Download Virus Telework HTML Inbound Marketing Bring Your Own Device Browsers Smartwatch Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Software License Comparison Google Play Music Google Drive Upload Procurement Social Network FinTech Staffing IP Address Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Point of Sale Electronic Payment Employer Employee Relationship Mobile Technology Value Botnet Television Security Cameras Telephony Trends Supply Chain Management Micrsooft Customer Resource management Organization Cabling Devices Cyber security Shortcuts Rental Service Phone System Flash Fileless Malware Tablet Smart Devices G Suite Tip of the week Tracking Company Culture Telephone Systems Mouse Business Growth VoIP Gamification Remote Working Competition Telephone System AI Regulations Trend Micro Be Proactive Recovery Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Digital Payment Desktop Wasting Time LiFi Banking SharePoint Entrepreneur Google Wallet Content Application Deep Learning Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Documents Messenger Computer Accessories Videos Business Intelligence Access Database Surveillance Public Cloud Managing Costs Business Metrics Hosted Solution Time Management Health IT Equifax SSID Securty Books Domains Language Audit Media Society Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?