Month: August 2018
Foreshadow foreshadowing trouble ahead?
Foreshadow has joined Spectre and Meltdown on the list of Intel’s announced chip security vulnerabilities this year. Intel announced the vulnerability and released a well-produced video explaining the lapse and recommended fixes. While Intel’s response to Spectre and Meltdown earlier...
Data management issues are about to create a major opportunity for MSPs
Given the extensive history most IT organizations have managing data leveraging all information to drive a wide variety of digital processes should be a simple enough proposition. But it turns out melding data sources is anything but easy. A new...
Network Management: In Search of a Few Good GUIs
Most of the time, interacting with electronic devices is as simple as point and click. In many instances, you don’t even have to think very hard about where to point, thanks to the richly intuitive tools that have evolved out...
How MSPs can help conquer K-12 security challenges
The ubiquitous yellow school buses are starting to rumble down the roads. High school athletes can be seen out on practice fields. Work-from-home parents will soon have their days “free” again. And for MSPs that manage school networks, summer breaks...
Tech Time Warp: The backstory behind your HP printer
For the modern user, HP is just another big-name brand in the world of PCs and printers. But the history of Hewlett Packard (which incorporated on Aug. 18, 1947) is downright charming — and predates the start of Apple, Microsoft,...
Modernization of IT services potentially cuts both ways for MSPs
A major shift in terms of how IT services are monitored and managed that is being driven by a need to correlate events in real time creates both risk and opportunity for managed services providers (MSPs). A survey of 100...
Clive Longbottom: MSPs need to think beyond physical security
As an MSP, you probably spend a lot of time making sure that your platform is secure — using long, complex passwords and (hopefully) two-factor authentication wherever possible; specifically named superuser accounts, rather than general shared sysadmin ones; heuristic-based anti-malware...
When it comes to security, even your fax machine could be vulnerable
The fax machine, that ancient document-transmission tool, is still in use in many offices. You would think that technology that was invented in the 19th century, and popularized in offices in the 1980s, would be fairly safe when it comes...
MSPs can look to provide end users with cybersecurity training
Given the costs of investigating security breaches and then cleaning up after them, managed service providers (MSPs) arguably now have a vested interest in training end users to better recognize cybersecurity threats. After all, it’s the MSP that usually absorbs...
Tech Time Warp: Microsoft Issues Alert on Blaster Worm
Fifteen years ago, Microsoft had a big problem on its hands. Machines running Windows 2003/XP/2000/NT were being infected by a nasty worm known as Blaster. On Aug. 11, 2003, Microsoft issued an alert warning of Blaster, which exploited a vulnerability...