WE HAVE MANY SUPPORT OPTIONS

3Get our response in 2 hours or less.

You can also email us at info @ intelliplans .com // Need Remote Support? Windows or Mac

WE'RE AVAILABLE 24/7

Sales: (850) 320-8171
24/7 Phone Support: (850) 549-2282 | (480) 624-2500
Customer Service | Contact Form | Email

 

  • Level 3 Systems Administrator with over 15 years of experience managing server infrastructures and data-center operations across multiple platforms (Unix, Linux, Windows)
  • Effectively plan, install, configure and optimize the IT infrastructure to consistently achieve high availability and performance.
  • Proven ability to create and deliver solutions tied to business growth, organizational development and systems/network optimization.
  • Skilled problem identifier and troubleshooter comfortable managing systems, projects and teams in a range of IT environments.
  • LAN/WAN/NOC Administration
  • Project Management
  • Workflow Planning
  • Productivity Improvement
  • Systems Installation, Configuration & Upgrading
  • Security Solutions
  • Database Design &
  • Management
  • NOS Patches & Updates
  • Level 2 Technical Support, Training & Mentoring

 

 

Why you Must Secure your CMS

Part of what has made the internet more of a necessity than a luxury is how accessible it is for people. So accessible that just about anyone can have their own website, which is why there are over one billion existing websites right now-a number that grows as impressively by the second as it has by the year.

So, why are CMS platforms targeted by hackers?

First, because websites on these platforms are so prevalent. Second, because the open-source framework of these systems requires webmaster responsibility and attention to security precautions.

There’s a lot of monetary incentive for hackers to find and exploit vulnerabilities in these systems since these CMS platforms are so widely used by businesses and for e-commerce purposes. That, on top of already existing hacker culture, is incentive enough for digital perpetrators to regularly target open source CMS systems.

Continue reading
Rate this blog entry:
1499 Hits
0 Comments

Critical vulnerabilities pose a serious threat to Joomla sites

b2ap3 large joomla security alertby Mark Stockley

Joomla, the world’s second most popular web content management system (CMS), has been under sustained attack for several days, thanks to a nasty pair of vulnerabilities disclosed last week.

Security announcements 20161001 (CVE-2016-8870) and 20161002 (CVE-2016-8869) describe how flaws in Joomla’s user registration code could allow an attacker to “register on a site when registration has been disabled” and then “register … with elevated privileges”.

If the significance of those two statements hasn’t entirely sunk in let me make it plain: taken together, the vulnerabilities can be used to unlock any site running Joomla, anywhere on the internet, with little more than a polite request detailing what you’d like to be called and how much power you want.

Continue reading
Rate this blog entry:
1542 Hits
0 Comments

Alert! Joomla Security Severity: High - Core - Elevated Privileges

[20161002] - Core - Elevated Privileges

  • Project: Joomla!
  • SubProject: CMS
  • Severity: High
  • Versions: 3.4.4 through 3.6.3
  • Exploit type: Elevated Privileges
  • Reported Date: 2016-October-21
  • Fixed Date: 2016-October-25
  • CVE Number: CVE-2016-8869

Description

Incorrect use of unfiltered data allows for users to register on a site with elevated privileges.

Affected Installs

Joomla! CMS versions 3.4.4 through 3.6.3

Solution

Upgrade to version 3.6.4

Continue reading
Rate this blog entry:
1579 Hits
0 Comments

Drupal drips out ten new patches, one worthy of immediate attention

Version 6.0 sent to code heaven, where old open source projects frolic among unicorns

Drupal has patched 10 holes in its platform that allow attackers to do things like access blocked resources and gain remote code execution.

The world's second-most-popular content management system also sent its sixth version to end-of-life status.

Six of the flaws are considered moderately severe and three minor for affected versions six, seven, and eight.

Continue reading
Rate this blog entry:
1248 Hits
0 Comments

Top daily DDoS attacks worldwide

 

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. They target a wide variety of important resources, from banks to news websites, and present a major challenge to making sure people can publish and access important information.

Continue reading
Rate this blog entry:
1604 Hits
0 Comments
TOP