Category: Security

uk cybersecurity
UK study shines spotlight on scope of IT security challenge

UK study shines spotlight on scope of IT security challenge

Despite the increased awareness concerning IT security threats, a new survey from the United Kingdom suggests far too many organizations still don’t have anything approaching a formal IT security strategy. Three-fifths (57 percent) of the respondents to a survey conducted...

/ April 20, 2017
cyber liability
What cyber liability errors & omissions coverages you REALLY need

What cyber liability errors & omissions coverages you REALLY need

In representing more than 900 IT clients across the United States, I have personally experienced the fact that many IT business owners think their business insurance covers client data loss situations or network security failures. I have news for you —...

/ April 19, 2017
workstation
Ask an MSP Expert: How can I minimize downtime from breach to detection?

Ask an MSP Expert: How can I minimize downtime from breach to detection?

Q: For my MSP, preventing and minimizing downtime for our customers is crucial—especially when we’re protecting data for businesses in highly regulated industries. What are a few improvements we can make that can really help us minimize the downtime from...

/ April 17, 2017
phone
Vulnerabilities beyond phishing: Why SMBs need to be cautious

Vulnerabilities beyond phishing: Why SMBs need to be cautious

Did you know that the average worker gets 121 emails a day? With so many emails pouring into inboxes, it’s no wonder that phishing attacks are successful. Not only are workers tirelessly keeping up with answering their emails, but the...

/ April 5, 2017
privacy policy
The MSP’s Bookshelf: The Art of Intrusion

The MSP’s Bookshelf: The Art of Intrusion

Security can be a challenge. One unprotected port, one unchanged default password, or even one improperly configured item can leave businesses open to vulnerabilities and breaches. With so much to safeguard, it can be easy to miss the one small...

/ March 29, 2017
Quiz: Which data loss threat are your customers most likely to fall for?

Quiz: Which data loss threat are your customers most likely to fall for?

Downtime is costly, and it can put your SMBs’ businesses in jeopardy. With so many ways to lose data, we wanted to make it easier for you to explain threats to your customers, which is why we created the Data...

/ March 23, 2017
password management
The woes of password management

The woes of password management

If you’re like anybody who uses computers today, you’re dealing with passwords. I alone have more than 58 just for the websites I use on a regular basis. That doesn’t include any hardware passwords,  Wi-Fi passwords, computer logins, or clients’...

/ March 20, 2017
factory
Ask an MSP Expert: How to create firewall policies for a company

Ask an MSP Expert: How to create firewall policies for a company

Q: With today’s evolving cyber threats, my IT service company is trying to offer our customers more proactive security measures beyond anti-malware and anti-spam filters. To really protect our customers, we want to offer a more sophisticated firewall solution. Once...

/ March 20, 2017
data management regulations
GDPR Promises to Forever Change How Data Gets Managed

GDPR Promises to Forever Change How Data Gets Managed

Given the rise of both Donald Trump and Theresa May, there’s never been more focus on regulations in recent memory. But the regulation that is starting to loom largest in the minds of business executives emanates from Brussels rather than...

/ March 14, 2017
advanced threats
Threat Watch: Resume Files containing Advanced Persistent Threats

Threat Watch: Resume Files containing Advanced Persistent Threats

As cybercriminals become more duplicitous by the day, businesses and individuals alike need to be more aware than ever of their digital surroundings. One example of this was recently highlighted on the Barracuda blog: Resume files containing Advanced Persistent Threats...

/ March 14, 2017