Beringer Technology Group: Blog
Cisco authentication bypass bug in EoL routers (CVE-2023-20025)
Cisco has released a notice of a critical authentication bypass vulnerability with public exploit code affecting multiple end-of-life routers. The security flaw (CVE-2023-20025) was found in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, and RV082 routers.…
Read MoreJanuary 2023 Beringer Technology Group Newsletter
GOOD NEWS AND GREAT INFORMATION FROM THE BERINGER TEAM! Take a look at our January 2023 Newsletter content. Contact Beringer Today if you would like to discuss implementation of any of the technologies featured in our newsletter. Beringer Technology Group, a leading…
Read MoreUsing Environment Variables with Cloud Flows
Do you leverage data from multiple applications or services? If you haven’t already found a way to integrate the data between them, you should check out Microsoft Cloud Flows, which are part of Power Automate and part of the overall…
Read MoreMicrosoft fixes broken ODBC connections
Microsoft has fixed a known issue affecting Windows apps using ODBC database connections after installing the November 2022 Patch Tuesday updates. This issue impacts both client and server Windows platforms, from Windows 7 SP1 and Windows Server 2008 SP2 up…
Read MoreBeringer Team Awarded by CRMSoftware Blog
Beringer Technology Group has been awarded Top Member status for 2022 by CRMSoftware Blog, for one of the highest counts of blogs posted on the site as well as consistent blog posting throughout last year. Announcement linked below: 2022 ERP/CRM…
Read MoreWhat are Power Apps Cards?
The Power Platform ecosystem keeps getting bigger and more capable. Microsoft continues to add functionality to existing components of the platform while simultaneously releasing new ones. One of the newest components (still in preview as of the writing of this…
Read MoreCybersecurity Tips – Role of HTTPS
During an age, where 66% of small-to-medium sized businesses’ have reported experiencing a cyber attack in the past 12 months, per Ponemon Institute’s State of Cybersecurity Report, it is critical that cybersecurity awareness and best practices are spread throughout users…
Read MoreInternet Explorer – Still being exploited
Google’s Threat Analysis Group has been made aware of a zero day vulnerability in Internet Explorer which is an infection of South Korean targets with malware. Google Tag was made aware of the attack on October 31st when multiple users…
Read MoreConsuming Excel Files with Cloud Flows for the Dataverse
Do you leverage data from multiple applications or services? If you haven’t already found a way to integrate the data between them, you should check out Microsoft Cloud Flows, which are part of Power Automate and part of the overall…
Read MoreDisable Ads and Notices in Windows 11
Did you know that Windows was designed to show notifications and ads, regardless of the version you’re running? Users of Windows 11 may be surprised to see more of these annoyances. If you’re wondering how to disable ads and notices…
Read MoreRecent Posts
How can we help?
Whether you're seeking a fully managed IT solution or expert assistance with a Microsoft solution, we're here to provide expert advice whenever you need it.
Call us at (800) 796-4854 or complete the form below and we'll help in any way we can.
"*" indicates required fields
Categories
- AI
- Announcements
- Backup & Disaster Recovery
- Business
- Business Communication Solutions
- Cloud Computing
- Copilot
- Cyber Security
- DataSyncCloud
- Dynamics 365
- Events
- Featured
- Hardware
- Information Technology
- IT Support & Management
- Life Sciences
- Manufacturing
- Marketing
- Microsoft Azure
- Microsoft Business Central
- Microsoft CRM for Distribution
- Microsoft Dynamics CRM
- Microsoft SharePoint
- Newsletter
- Office
- Office 365
- Power BI
- Power Platform
- Recent News
- Remote Workplace
- Security
- Social Media
- Training
- Uncategorized
- Virtualization
- VoIP
- Web & Cloud
- Whitepapers
- Windows