Category: Security

Ask an MSP Expert: How to develop a security policy for an SMB customer

Ask an MSP Expert: How to develop a security policy for an SMB customer

Q: We recently brought on a new customer who doesn’t have any security policies in place.  What are the best ways to help them set up security policies for their network? Ransomware and malware attacks are continually on the rise,...

/ May 21, 2018
ATM security
ATM security threats: Jackpotting and beyond

ATM security threats: Jackpotting and beyond

It’s easy to forget ATMs have been around so long. When ATM machines began showing up in my Ohio hometown sometime in the late 1970s, my grandmother found the technology incomprehensible. “Isn’t it nice that the banks give you money?”...

/ May 15, 2018
Hollerith tabulator
Tech Time Warp: The First Ethical Hacker

Tech Time Warp: The First Ethical Hacker

These days, the concept of an ethical hacker is so commonplace the profession has its own Certified Ethical Hacker designation, bestowed and governed by the International Council of E-Commerce Consultants. The ethical hackers of the world put their genius to...

/ May 11, 2018
school IT security
MSPs have to outsmart wily students

MSPs have to outsmart wily students

There was a time when a teacher using an overhead projector was considered high-tech, but now smartboards, student tablets, smartphones, laptops, and campus-wide networks have turned schools into hubs of connectivity that are often too much for an in-house staff...

/ May 9, 2018
Artificial intelligence cyber warfare
Weaponizing artificial intelligence

Weaponizing artificial intelligence

Fending off ransomware and other malware attacks has already become part of the daily MSP landscape. But in the ever-evolving world of threats, a new one will begin to emerge with greater frequency in the months and years ahead: weaponized...

/ May 3, 2018
Ask an Expert: How can I make sure SMB default settings are aligned with best practices?

Ask an Expert: How can I make sure SMB default settings are aligned with best practices?

Q: We’ve run into issues where clients create their own workaround to try to get something done faster. For example, we’ll see that firewall settings changed or antivirus has been disabled. How can we manage this to ensure that our...

/ April 30, 2018
Sasser worm
Tech Time Warp: The Sasser worm teaches a lesson

Tech Time Warp: The Sasser worm teaches a lesson

In early May 2004, computer users worldwide learned a hard lesson: Don’t procrastinate when it comes to installing a security patch. Users at the Taiwanese post office, the train station in Sydney, and some of Wall Street’s biggest banks found...

/ April 27, 2018
ransomware warning
MSPs Beware: The Future of Ransomware

MSPs Beware: The Future of Ransomware

The idea of a shady cabal or a nefarious cyber army of one holding an entire city’s data hostage while they negotiate for ransom sounds like a plot lifted straight from a 1990s B movie. But yesterday’s fantasy is today’s...

/ April 25, 2018
Atlanta ransomware attack
Atlanta ransomware attack highlights IT vulnerabilities of cities

Atlanta ransomware attack highlights IT vulnerabilities of cities

Atlanta, car-clogged highways aside, is the elegant, magnolia-draped metropolis of the South: cosmopolitan, visionary, and Olympic caliber. But, for a few days in March 2018, the daily rhythms of governmental life came to a screeching halt. Water bill payments couldn’t...

/ April 17, 2018
Ask an MSP Expert: What are some fresh approaches to security education?

Ask an MSP Expert: What are some fresh approaches to security education?

Q: Every week, there seems to be a new threat I need to educate my customers on. I know it’s important to teach them what to watch out for, but I feel like we’re creating a lot of noise. What...

/ April 16, 2018