PrintNightmare: A Windows Server Security Flaw, and What to Do
It’s called “PrintNightmare.” It’s a recently discovered remote code execution vulnerability affecting Print Spooler, a built-in service that’s enabled by default on Windows machines. The Print Spooler service is designed to interact with printer and manage jobs in the printing queue. Among other benefits, spooling print jobs is usually faster than sending them directly to […]
The Executive Order on Cybersecurity: What Does it Mean to You?
With massive breaches involving SolarWinds, Microsoft Exchange and the Colonial Pipeline taking place in recent months, it’s become obvious that additional focus is required on our cybersecurity posture as a nation. To that end, on May 12 President Biden signed an Executive Order (EO) to improve cybersecurity standards and our response to cyber threats. The […]
What’s the Password? The Way to Stronger Security

There was a time when people needed passwords only if they were trying to get past the sentry in an old war movie. Simpler times indeed. Now as both our business and personal lives move to the cloud, you can’t even watch that war movie on Netflix without a password. With cybercrime on the increase […]
Cybersecurity for a Vital Mission: CHEP Case Study
Our work in improving the operations and cybersecurity posture for organizations of all types is always vital. When the organization is a nonprofit doing great work on behalf of our veterans, though, it feels even more important. CHEP (Chesapeake Health Education Programs, Inc.) is a Cecil County, Maryland-based organization with the dual mission of providing […]
The Three Layers of the Web
Surely by now you’ve heard of the Dark Web, where all the seamy stuff happens. What you might not know is that the internet actually has three layers, not two. Understanding each layer and how it’s used is an important part of any approach to cybersecurity. Let’s take a look: Surface Web: This is the […]
Extortionware: When Good Backups are No Longer Enough
By now you know how ransomware works: hackers hijack data belonging to a business and demand a large payment to unencrypt it. You’re also probably aware of the spike in incidents over the last year as businesses have scrambled to establish a work-from-home (WFH) environment, leaving many security gaps to be exploited in the process. […]
Case Study: Root 3 Labs
A Managed Services Provider (MSP) offers a number of different services, and the needs of each business will vary. From time to time we’ll share an actual case study of a Hill Tech Solutions client, the issues they were encountering and the solutions provided. Root3 Labs, headquartered in Owings Mills, Maryland is an engineering company […]
How Much Should I Spend on IT?
If you’re a business owner, chances are that at some point you’ve asked yourself, “How much should I spend on technology?” Beyond the hardware, there’s a dizzying number of security solutions, and a successful security profile will always involve some combination of products and tactics. To further confuse things, different managed services providers (MSPs) will […]
Found a USB Stick? Don’t Get Stuck.
You’re walking along and minding your own business when you spot a USB thumb drive on the ground somewhere, maybe even on the floor in your office building. You might be tempted to see what’s on it, even if only to try to reunite it with its rightful owner. Don’t. Weaponized USB drives are a […]
Why Are My MSPs Rates Going Up?
If you own a small business, you’ve probably figured out that having a Managed IT Services Provider (MSP) on your team is no longer optional. Having an MSP on board to take IT concerns off your plate has always been a good idea, but with massive increases in ransomware and other malware that could threaten […]