West Tennessee, East Arkansas, North Mississippi 901-300-4000

Archive for August, 2022

Large Scale Okta Phishing Campaign Targets Many Organizations

According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no less than 130 organizations across a broad range of industries. These ...

Healthcare Data Breach Exposes 1.3 Million Patients

Do you make use of the "MyChart" portal to refill prescriptions, contact your healthcare providers or make appointments? If so, you should know that recently, the healthcare giant Novant disclosed a data ...

LastPass Has Been Hacked

Using different passwords on every website and storing them in a secure password manager is a standard best practice in data security. It's generally good advice, but what happens when the makers ...

New Tools Available With Kali Linux 2022.3

Do you have the Kali Linux distribution running on one of the machines you own?  If you're not sure what that is, then you almost certainly don't.  Kali is a Linux distro ...

Microsoft Releases PoC Code For MacOS App Sandbox Vulnerability

MacOS features a powerful sandbox restriction that helps keep modern Apple computers safe by limiting how code can run on the system. Unfortunately, no system is bullet proof. There's a way that ...

Lenovo Models Affected By Medium Severity Vulnerabilities

If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and ...

Microsoft 365 Suggests Rollback After Issues From Update

Does your company use Microsoft 365?  If so, and you've noticed that your Office apps have begun to crash mysteriously and inexplicably, be aware that the latest update (build 15330.20298) is the ...

IoT Security With Microsoft Defender

The Internet of Things (IoT) has seen explosive growth in recent years. If you like, you can now build your own smart home with intelligent toasters, washing machines, dishwashers, and refrigerators. They ...

Hackers Use VoIP Systems To Install PHP Web Shells

Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed at Elastix VoIP telephony servers. They are used by companies of ...

Google Experiences International Outage

"Just Google it."  You've probably heard that phrase a thousand times.  In fact, you may use it yourself on a regular basis. Unfortunately, Googling it wasn't possible recently.  The iconic search giant ...

Blog

Smarter Business Decisions Start with Powerful Analytics Tools

Smarter Business Decisions Start with Powerful Analytics Tools

You shouldn’t leave important business decisions up to chance. That’s why learning to use analytics tools is essential to help[...]
X Expands Security Team With Hiring Surge

X Expands Security Team With Hiring Surge

X (formerly Twitter) is re-upping its commitment to being a secure platform by going on a hiring spree. Two years[...]
Hackers Bypass Google Chrome’s Infostealer Malware Block

Hackers Bypass Google Chrome’s Infostealer Malware Block

No one wants hackers, especially business owners, to access their most precious data. Google aimed to help with an update[...]

Locations

Atoka (HQ)

61 Orchid Dr
Atoka, TN 38004
901-300-4000

Branch

Memphis, TN 38119
Covington, TN 38019
Southaven, MS 38671

Company

Since 2013, Freedmind Managed Solutions has been a leading provider of IT support and consulting, focusing on small and medium sized businesses in the West Tennessee, East Arkansas, North Mississippi area. We have helped hundreds of businesses increase productivity and profitability by making IT a streamlined part of operations. We equip our clients with customized technology solutions for greater operational value and to reduce risk.

Proud Member of

The 20 Elite Freedmind Managed Solutions BBB Business Review

Newsletter

Join our Newsletter to get the latest technology news and special offers.