Category: Security

privacy policy
The MSP’s Bookshelf: The Art of Intrusion

The MSP’s Bookshelf: The Art of Intrusion

Security can be a challenge. One unprotected port, one unchanged default password, or even one improperly configured item can leave businesses open to vulnerabilities and breaches. With so much to safeguard, it can be easy to miss the one small...

/ March 29, 2017
Quiz: Which data loss threat are your customers most likely to fall for?

Quiz: Which data loss threat are your customers most likely to fall for?

Downtime is costly, and it can put your SMBs’ businesses in jeopardy. With so many ways to lose data, we wanted to make it easier for you to explain threats to your customers, which is why we created the Data...

/ March 23, 2017
password management
The woes of password management

The woes of password management

If you’re like anybody who uses computers today, you’re dealing with passwords. I alone have more than 58 just for the websites I use on a regular basis. That doesn’t include any hardware passwords,  Wi-Fi passwords, computer logins, or clients’...

/ March 20, 2017
factory
Ask an MSP Expert: How to create firewall policies for a company

Ask an MSP Expert: How to create firewall policies for a company

Q: With today’s evolving cyber threats, my IT service company is trying to offer our customers more proactive security measures beyond anti-malware and anti-spam filters. To really protect our customers, we want to offer a more sophisticated firewall solution. Once...

/ March 20, 2017
data management regulations
GDPR Promises to Forever Change How Data Gets Managed

GDPR Promises to Forever Change How Data Gets Managed

Given the rise of both Donald Trump and Theresa May, there’s never been more focus on regulations in recent memory. But the regulation that is starting to loom largest in the minds of business executives emanates from Brussels rather than...

/ March 14, 2017
advanced threats
Threat Watch: Resume Files containing Advanced Persistent Threats

Threat Watch: Resume Files containing Advanced Persistent Threats

As cybercriminals become more duplicitous by the day, businesses and individuals alike need to be more aware than ever of their digital surroundings. One example of this was recently highlighted on the Barracuda blog: Resume files containing Advanced Persistent Threats...

/ March 14, 2017
shared security model
Ask an MSP Expert: Why is it important for me to secure the public cloud?

Ask an MSP Expert: Why is it important for me to secure the public cloud?

Q: My SMB customers are slowly starting to embrace the public cloud. Cloud service providers have built-in security features, though. Is this enough to protect my customers’ data? Are there any additional precautions I should take to make sure their...

/ March 6, 2017
Quiz: How much do you really know about ransomware?

Quiz: How much do you really know about ransomware?

Ransomware has quickly evolved from simply blocking users from gaining access to their files to encrypting files and even attacking servers. Cybercriminals are also becoming savvier when it comes to disguising attacks, making it harder for businesses to avoid them....

/ February 20, 2017
it security fatigue
Growing IT security fatigue bodes well for MSSPs

Growing IT security fatigue bodes well for MSSPs

The size of the opportunity for managed security service providers (MSSPs) has always been constrained by one dominant factor. Far too many IT organizations believe they can adequately defend their organizations despite all evidence to the contrary. But, a new report...

/ February 14, 2017
Ransomware is now a $1 billion industry

Ransomware is now a $1 billion industry

A new ransomware report from IBM Security finds that nearly one in two business executives have experienced ransomware attacks in the workplace, and 70 percent of those executives said their company has paid to regain access to encrypted data. In...

/ December 20, 2016