Category: Security

cyber security
Threat Watch: WannaCry Ransomware

Threat Watch: WannaCry Ransomware

It’s no secret that cyber threats are becoming more widespread and sophisticated day-by-day. But, according to an article on CNN today, cyber security experts were stunned worldwide by the outbreak of WannaCry, a ransomware that infects Windows computers and locks...

/ May 12, 2017
hacked
Ask an MSP Expert: What if my MSP gets hacked?

Ask an MSP Expert: What if my MSP gets hacked?

Q: Lately I’ve been hearing a lot about a group of Chinese hackers called APT10 and how they target MSPs. My MSP work with customers in highly regulated industries, so we have a lot of sensitive data to protect. What...

/ April 24, 2017
uk cybersecurity
UK study shines spotlight on scope of IT security challenge

UK study shines spotlight on scope of IT security challenge

Despite the increased awareness concerning IT security threats, a new survey from the United Kingdom suggests far too many organizations still don’t have anything approaching a formal IT security strategy. Three-fifths (57 percent) of the respondents to a survey conducted...

/ April 20, 2017
cyber liability
What cyber liability errors & omissions coverages you REALLY need

What cyber liability errors & omissions coverages you REALLY need

In representing more than 900 IT clients across the United States, I have personally experienced the fact that many IT business owners think their business insurance covers client data loss situations or network security failures. I have news for you —...

/ April 19, 2017
workstation
Ask an MSP Expert: How can I minimize downtime from breach to detection?

Ask an MSP Expert: How can I minimize downtime from breach to detection?

Q: For my MSP, preventing and minimizing downtime for our customers is crucial—especially when we’re protecting data for businesses in highly regulated industries. What are a few improvements we can make that can really help us minimize the downtime from...

/ April 17, 2017
phone
Vulnerabilities beyond phishing: Why SMBs need to be cautious

Vulnerabilities beyond phishing: Why SMBs need to be cautious

Did you know that the average worker gets 121 emails a day? With so many emails pouring into inboxes, it’s no wonder that phishing attacks are successful. Not only are workers tirelessly keeping up with answering their emails, but the...

/ April 5, 2017
privacy policy
The MSP’s Bookshelf: The Art of Intrusion

The MSP’s Bookshelf: The Art of Intrusion

Security can be a challenge. One unprotected port, one unchanged default password, or even one improperly configured item can leave businesses open to vulnerabilities and breaches. With so much to safeguard, it can be easy to miss the one small...

/ March 29, 2017
Quiz: Which data loss threat are your customers most likely to fall for?

Quiz: Which data loss threat are your customers most likely to fall for?

Downtime is costly, and it can put your SMBs’ businesses in jeopardy. With so many ways to lose data, we wanted to make it easier for you to explain threats to your customers, which is why we created the Data...

/ March 23, 2017
password management
The woes of password management

The woes of password management

If you’re like anybody who uses computers today, you’re dealing with passwords. I alone have more than 58 just for the websites I use on a regular basis. That doesn’t include any hardware passwords,  Wi-Fi passwords, computer logins, or clients’...

/ March 20, 2017
factory
Ask an MSP Expert: How to create firewall policies for a company

Ask an MSP Expert: How to create firewall policies for a company

Q: With today’s evolving cyber threats, my IT service company is trying to offer our customers more proactive security measures beyond anti-malware and anti-spam filters. To really protect our customers, we want to offer a more sophisticated firewall solution. Once...

/ March 20, 2017