Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Navigating holiday cyber risks

Cybersecurity Threat Advisory: Navigating holiday cyber risks

The holiday season is here, and organizations are facing an increased risk of cyberthreats with a notable focus on the activities of access brokers. These threat actors specialize in gaining and selling unauthorized access to organization accounts by orchestrating social...

/ November 27, 2023 / 13 Comments
Defense against cybercrime
Awareness is a tried-and-true cybercrime defense mechanism

Awareness is a tried-and-true cybercrime defense mechanism

I have been writing about cybercrime for years and have witnessed the methodology and tools that criminals use to evolve. One truism about cybercrime is that it knows no boundaries. Unlike conventional crimes, where a criminal is stopped at a...

/ November 23, 2023
Cybersecurity cutbacks require resilient MSPs

Cybersecurity cutbacks require resilient MSPs

As more organizations encounter economic headwinds, the rate at which cybersecurity budgets have been increasing is slowing down. A survey of 550 Chief Information Security Officers (CISOs) conducted by IANS Research and Artico Search finds cybersecurity budgets only increased an...

/ November 21, 2023
Protecting your customers’ data in the age of ransomware

Protecting your customers’ data in the age of ransomware

There is a cybersecurity paradox in many organizations that MSPs should consider when working with prospects and existing clients. Most companies see cyber threats as their top concern and believe they have implemented sufficient protection and best practices to protect...

/ November 20, 2023
Shields Up
Shields up: How MSPs can advance cybersecurity with cutting-edge technologies

Shields up: How MSPs can advance cybersecurity with cutting-edge technologies

“Bottoms up” is a good-natured toast or nudge to get one to finish their drink. The Cybersecurity and Infrastructure Security Agency (CISA) is introducing a good-natured nudge to get organizations to finish their resiliency called “Shields Up!” You probably won’t...

/ November 16, 2023
Essential tips and strategies for protecting against ransomware

Essential tips and strategies for protecting against ransomware

In September, MGM Resorts faced system outages (affecting hotel room keycard systems and slot machines) and service disruptions at its Las Vegas properties. Caesars Entertainment also reported suffering a data breach that revealed its loyalty program members’ Social Security and driver’s license...

/ November 16, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Bibi-Windows Wiper on the rise

Cybersecurity Threat Advisory: Bibi-Windows Wiper on the rise

Israel has recently been the target of cyberattacks involving a wiper malware that was previously observed to target both Linux and Windows systems. The wiper, named “BiBi-Windows Wiper”, has been used by a pro-Hamas hacker group in the wake of...

/ November 15, 2023
security transformation
The dawn of real-time defense: security transformation in the 2000s

The dawn of real-time defense: security transformation in the 2000s

As part of our 5-part series on the evolution of cybersecurity, check out our third article below that covers how the beginning of the 21st century witnessed a relentless battle between cybercriminals and security experts, fueled by the rapid evolution of...

/ November 14, 2023
combatting cyberattacks
Utilizing news resources as a cybersecurity tool

Utilizing news resources as a cybersecurity tool

One of the best cybersecurity tools isn’t fancy software or a skilled engineer (both of which are important and have their place). Instead, it is something that doesn’t even cost a cent: news and information. “I work with a lot...

/ November 9, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities

Cybersecurity Threat Advisory: Urgent Veeam ONE vulnerabilities

Several serious security flaws have been found in the Veeam ONE platform for analytics and IT infrastructure monitoring. These vulnerabilities may result in data breaches, illegal access, and NTLM hash theft. To fix these problems, Veeam has published security patches...

/ November 8, 2023