Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the simple-pay domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114
Swiftpage Act Security Notice 4-19-22 | Friendly Act CRM Software Database Sales Support & Training

Swiftpage Act Security Notice 4-19-22

by | May 23, 2022 | Act CRM News & Updates

Act Security Notice

In more than 20 years of dealing with Act Software this is the first Act Security Notice I have ever seen from Act.  This security notice is important.

From www.Act.com | https://www.act.com/notices/important-notice/

Act! Premium & Act! Growth Suite On-Premises Subscribers

To ensure the vulnerability described above is addressed, you will need to apply the appropriate update for your supported version as soon as possible. If you are currently running Act! v21 or earlier, you will need to upgrade to Act! v24 Update 4 to address this issue. Customers who host or sync their software via a 3rd party hosting provider should contact that provider immediately to discuss the appropriate remedy.

Updates are being made available for Act! v24, Act! v23, and Act! v22.1*. See below for the release schedule and instructions.

Act! Premium & Act! Growth Suite Cloud Subscribers

To ensure the vulnerability described above is addressed, an update is required for your supported version.

  • Customers who solely access Act! in the cloud (hosted by Act!) are no longer exposed to this vulnerability, thus no action is required.
  • Customers who sync a local instance of Act! to Act! in the cloud (hosted by Act!) must apply the appropriate update for their supported version on their local instance by April 19, 2022 in order to continue syncing.
  • Customers who sync a local instance of Act! via their own network (LAN, VPN, site-to-site internet sync) will not experience an interruption in sync services but remain at risk until they apply the appropriate update for their supported version.
  • Customers who host or sync their software via a 3rd party hosting provider should contact that provider immediately to discuss the appropriate remedy.

Updates are being made available for Act! v24, Act! v23, and Act! v22.1*. If you are currently running a local instance of Act! v21 or earlier, you will need to upgrade to Act! v24 Update 4 to address this issue. See below for the release schedule and instructions.

Pro & Premium Perpetual License Holders

To ensure the vulnerability described above is addressed, you will need to apply the appropriate update for your supported version as soon as possible. If you are currently running Act! v21 or earlier, you will need to upgrade to Act! v24 Update 4 to address this issue. Customers who host or sync their software via a 3rd party hosting provider should contact that provider immediately to discuss the appropriate remedy.

Pro Perpetual License Holders: Updates will be made available for Act! Pro v24 and Act! Pro v22.1*.

Premium Perpetual License Holders: Updates will be made available for Act! v24, Act! v23, and Act! v22.1*.

See below for the release schedule and instructions.

Available Updates & Instructions

Updates are being made available for Act! v24, Act! v23 and Act! v22.1. To ensure the vulnerability described above is addressed, you will need to apply the appropriate update for your supported version as soon as possible.

Available Updates:

You can download and install using the links above, or install directly via Act! following the instructions below.
 
1) Ensure the Act! application is closed
2) Right-click Act!
3) Select run-as-admin
4) Enter username and password details
5) Navigate to the Help Menu
6) Select Act! Notifications and follow the on-screen prompts to install the latest update.

Note: Customers who host or sync their software via a 3rd party hosting provider should contact that provider immediately to discuss the appropriate remedy.

 

Frequently Asked Questions

A vulnerability was recently identified in Act! via routine penetration testing. The Act! engineering team has reviewed, fixed and re-assessed the vulnerability with a third-party threat intelligence vendor. Updates that address this issue are being made available for Act! v24, Act! v23, and Act! v22.1*. See above for the release schedule and additional details.

*Note for Act! v22.x users: As of March 31, 2022, Act! v22.x products are no longer supported. However, if you are running Act! v22.x and elect not to upgrade to Act! v24 Update 4 or another supported version, we will be making available a one-time update for Act! v22.1 that addresses this specific issue. Please note that this decision to provide an update for Act! v22.1 in this instance shall not be precedent, or require us to provide, neither now nor in the future, any fixes for additional issues that may or will arise after the date of obsolescence as specified in the Act! Support Obsolescence Policy at act.com/obs.