Citrix StoreFront and Workspace App Affected by New Vulnerabilities

Citrix has just announced security issues that impact Citrix StoreFront and Citrix Workspace app. Each vulnerability is detailed below with steps customers can take to mitigate the issue.   Citrix StoreFront Vulnerability If exploited, this issue, identified as CVE-2020-8200, would allow an attacker who is authenticated on the same Microsoft Active Directory domain as a…

Learn more

Microsoft Defender Update Causing Issues with Citrix Delivery Controllers and Cloud Connectors

Citrix has announced an issue impacting the Citrix Broker and Citrix HighAvailability services on the Delivery Controllers and Citrix Cloud Connectors with Microsoft Defender installed.   The problem: The Microsoft Defender update is causing Defender to detect Citrix Broker Service And Citrix High Availability Service as Trojan and deleting them.   Your environment may be…

Learn more

New Citrix Vulnerabilities – What You Need to Know

Citrix has just released an article identifying multiple vulnerabilities in Citrix ADC, Citrix Gateway and Citrix SD-WAN WANOP. These vulnerabilities,  if exploited,  could result in several security issues  including: Attacks that are limited to the management interface. Mitigating Factors: Customers who have configured their systems in accordance with Citrix recommendations in this guide have significantly reduced their risk. Attacks that…

Learn more

Virtual Teaming: 5 Tech Tips to Make Remote Work Productive (and Fun)

Work environments look incredibly different than they did just a month or so ago. And they have continued to change weekly as companies adapt and rethink their strategies to ensure business continuity. During this unprecedented time, people are craving information and connection. There are plenty of technologies and tools out there that can help your…

Learn more

How to Enable Multi-factor (nFactor) Authentication for WFH Users with Your Citrix ADC

With an increased demand for expanded mobile access in response to the COVID-19 pandemic, many organizations are struggling with how to configure multi-factor (nFactor) authentication for external users. That’s why we put together this guide for you, outlining the steps to configure nFactor authentication. First, the primary entity used for nFactor authentication is called a…

Learn more

2020 LDAP channel binding and LDAP signing requirement for Windows

Updated 2/6/20 As you may have seen, a set of unsafe default configurations for LDAP channel binding and LDAP signing exist on Active Directory Domain Controllers that let LDAP clients communicate with them without enforcing LDAP channel binding and LDAP signing. This can open Active Directory domain controllers to elevation of privilege vulnerabilities. Please read…

Learn more

Mindfulness: It’s not just for yogis, it’s for techies too

A piece from A2U’s Joel Archibald on how to better manage stress at work through practicing mindfulness and other mediation-related activities.   ‘Tis the season to be jolly – or is it? According to a survey by the American Psychological Association, 38 percent of people said their stress level increases during the holidays. In general,…

Learn more

PRESS RELEASE: A2U is a Proud Partner in U.S. National Health IT Week

  FOR IMMEDIATE RELEASE Media Contact: Bridgette Borst Ombres bridgette@a2u.net 412-491-9074 A2U IS A PROUD PARTNER IN U.S. NATIONAL HEALTH IT WEEK September 24, 2019 – PITTSBURGH, Pa. – A2U, a leading IT solutions provider, announced today that it is a proud partner of U.S. National Health IT Week (NHIT Week) September 23-27. NHIT Week…

Learn more

7 best practices to securely deploy enterprise-grade apps

If you’re like most companies, you’ve implemented BYOD policies and are enabling employees to use their personal devices for work. You’ve created security and compliance guidelines that are now in place across your organization. You’ve possibly even considered and/or have implemented a mobile device management (MDM) solution to help your IT teams extend their management…

Learn more

Traditional Workspaces vs. Secure Digital Workspaces

Do you continue on with the traditional workspace that you’ve been using—because of the clear advantages it brings to IT? Or, do you make the investment in a new secure digital workspace—where the benefits apply not only to IT, but also to your wide base of users that are increasingly working outside the confines of…

Learn more