Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

Alert: Microsoft Fixes 27 Vulnerabilities in Latest Round of Patches

In the latest round of security patches released by Microsoft, 27 vulnerabilities were fixed. Affected software includes major titles like Windows, Microsoft Office, Internet Explorer, and the new Edge browser. It’s imperative that you apply these security patches as soon as you can, or else your system will be exposed to some serious threats.

If you have already applied the latest security patches, then you have nothing to worry about. Read on only to discover what kind of threats your quick thinking prevented. If, however, you have yet to apply the security patches, then you’ll want to pay attention to how your network is at risk.

Concerning the vulnerabilities with Microsoft Office, Internet Explorer, and Edge, they are critical in nature and could be exploited remotely through web pages or Office documents, allowing hackers to execute malicious code. Read more about these patches on Microsoft’s security bulletin:

Patch for Microsoft Office: MS16-099
Patch for Internet Explorer: MS16-095
Patch for Edge: MS16-096

More critical vulnerabilities have been found affecting Windows, Microsoft Office, Skype, and Lync. These vulnerabilities have to do with the Windows Graphics Component, which allows hackers to execute remote code through malicious web pages and documents.

Patch for Windows, Microsoft Office, Skype, and Lync: MS16-097

Another security bulletin from Microsoft has to do with a critical remote code execution flaw in Windows PDF Library, which happens to be bundled with Windows 8.1, Windows RT 8.1, Windows 10, Windows Server 2012, and Windows Server 2012 R2. Also, the vulnerability affects Edge in a unique way, allowing attackers to exploit a malicious PDF document hosted on a website, and then trick users into loading the file via their Edge browser.

Patch for Windows PDF Library: MS16-102

Other patches have been flagged by Microsoft as “important” instead of “critical,” but this doesn’t mean they should be ignored.

MS16-101
MS16-100
MS16-098

Have you updated your system with these latest security patches? If you haven’t and you would like assistance getting your company’s network up-to-date and protected, call Voyage Technology at 800.618.9844.

For organizations having their network managed by Voyage Technology, there is no need for alarm. The security patches have already been applied. This is the case with all relevant patches released by Microsoft, both now and in the future. Isn’t it nice to have one less thing to worry about?

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 06 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Managed Service Ransomware Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android VoIP Upgrade Smartphones Business Management Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Managed Services Data Security Apps Vendor Two-factor Authentication Mobile Office Voice over Internet Protocol App Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking How To BDR HIPAA Computing Physical Security Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 Conferencing Password Managed IT Services Healthcare Operating System Computers Router Virtual Private Network Risk Management Website Health Help Desk Office Tips Analytics Augmented Reality Retail 2FA Storage Bring Your Own Device Big Data Social Cooperation Remote Workers Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Customer Service Free Resource Project Management Cybercrime Windows 7 Microsoft 365 Display Printer Paperless Office Solutions Infrastructure Monitoring Firewall Document Management Windows 11 Managed IT Service Telephone The Internet of Things Scam Excel Data loss Telephone System iPhone Robot Customer Relationship Management Cost Management Settings Printing Vulnerabilities Wireless Content Filtering Data Privacy Hacking IT Management Images 101 Presentation VPN YouTube Meetings Cryptocurrency Multi-Factor Authentication Mobility Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Data storage LiFi Employees Word Integration Smart Technology Outlook Machine Learning Money Saving Time Humor Holidays Safety Data Storage Maintenance Antivirus Sports Supply Chain Downloads Mouse Video Conferencing Licensing Managed Services Provider Virtual Machines Professional Services Entertainment Administration Alert Evernote Paperless Regulations Compliance Application Best Practice Trends Managed IT Customer Resource management Memes Buisness File Sharing Regulations Co-managed IT Dark Data Google Calendar IBM Legal Data Analysis Net Neutrality IT solutions Star Wars SQL Server Technology Care How To Microsoft Excel History Notifications Staff Business Communications Financial Data Business Growth Gamification Smartwatch IT Travel Social Networking Scams Legislation Techology Fileless Malware Procurement Google Maps Azure Hybrid Work Cortana Alt Codes Content Cyber security Wearable Technology Tech Human Resources Telework CES Competition Health IT Communitications Downtime Unified Threat Management Motherboard Cables Comparison Permissions Unified Threat Management Directions Supply Chain Management Hosted Solution Assessment Typing Term Google Apps FinTech IT Assessment IT Maintenance Network Congestion Specifications Knowledge Fraud Google Drive User Error Microchip Flexibility User Internet Exlporer Value Business Intelligence Username Shortcuts Organization Digital Security Cameras Smart Devices Point of Sale Ransmoware 5G Black Friday Experience IP Address Google Docs Remote Working Unified Communications Database Memory Vendors Bitcoin Network Management Data Breach Running Cable Tech Support IT Technicians Google Play Be Proactive Videos Google Wallet Proxy Server Electronic Health Records Cookies Workforce Monitors Cyber Monday Hotspot Recovery Tactics Wasting Time Threats Hard Drives Windows 8 Trend Micro Laptop Websites Mirgation Security Cameras Workplace Strategies Domains Drones Software as a Service Nanotechnology Meta Electronic Medical Records Language SharePoint Addiction Managing Costs Amazon Refrigeration Management eCommerce Halloween Chatbots SSID Public Speaking Lenovo Surveillance Screen Reader Virtual Assistant Outsource IT Writing Distributed Denial of Service Virtual Reality Computing Infrastructure Media Lithium-ion battery Service Level Agreement Virtual Machine Environment Hacks Server Management Entrepreneur Scary Stories Private Cloud Identity Medical IT Reviews Superfish Bookmark Development Identity Theft Smart Tech Transportation Small Businesses Fun Twitter Alerts Deep Learning Download Hypervisor Displays Undo Optimization Error PowerPoint Shopping Browsers Education Connectivity Employer/Employee Relationships Outsourcing Social Engineering Break Fix Remote Computing Navigation PCI DSS Upload Mobile Computing Social Network Workplace Multi-Factor Security Gig Economy Internet Service Provider Tablet IoT Teamwork Hiring/Firing Search Dark Web

Blog Archive