Category: Security

wannacry ransomware
WannaCry ransomware should eventually blow some good for MSPs

WannaCry ransomware should eventually blow some good for MSPs

While the fallout from the WannaCry ransomware attack will reach into the billions of dollars, the one positive outcome should be a wave of upgrades for millions of older Windows PCs that unfortunately are still widely deployed. The malware employed...

/ May 16, 2017
cyber security
Threat Watch: WannaCry Ransomware

Threat Watch: WannaCry Ransomware

It’s no secret that cyber threats are becoming more widespread and sophisticated day-by-day. But, according to an article on CNN today, cyber security experts were stunned worldwide by the outbreak of WannaCry, a ransomware that infects Windows computers and locks...

/ May 12, 2017
hacked
Ask an MSP Expert: What if my MSP gets hacked?

Ask an MSP Expert: What if my MSP gets hacked?

Q: Lately I’ve been hearing a lot about a group of Chinese hackers called APT10 and how they target MSPs. My MSP work with customers in highly regulated industries, so we have a lot of sensitive data to protect. What...

/ April 24, 2017
uk cybersecurity
UK study shines spotlight on scope of IT security challenge

UK study shines spotlight on scope of IT security challenge

Despite the increased awareness concerning IT security threats, a new survey from the United Kingdom suggests far too many organizations still don’t have anything approaching a formal IT security strategy. Three-fifths (57 percent) of the respondents to a survey conducted...

/ April 20, 2017
workstation
Ask an MSP Expert: How can I minimize downtime from breach to detection?

Ask an MSP Expert: How can I minimize downtime from breach to detection?

Q: For my MSP, preventing and minimizing downtime for our customers is crucial—especially when we’re protecting data for businesses in highly regulated industries. What are a few improvements we can make that can really help us minimize the downtime from...

/ April 17, 2017
phone
Vulnerabilities beyond phishing: Why SMBs need to be cautious

Vulnerabilities beyond phishing: Why SMBs need to be cautious

Did you know that the average worker gets 121 emails a day? With so many emails pouring into inboxes, it’s no wonder that phishing attacks are successful. Not only are workers tirelessly keeping up with answering their emails, but the...

/ April 5, 2017
privacy policy
The MSP’s Bookshelf: The Art of Intrusion

The MSP’s Bookshelf: The Art of Intrusion

Security can be a challenge. One unprotected port, one unchanged default password, or even one improperly configured item can leave businesses open to vulnerabilities and breaches. With so much to safeguard, it can be easy to miss the one small...

/ March 29, 2017
Quiz: Which data loss threat are your customers most likely to fall for?

Quiz: Which data loss threat are your customers most likely to fall for?

Downtime is costly, and it can put your SMBs’ businesses in jeopardy. With so many ways to lose data, we wanted to make it easier for you to explain threats to your customers, which is why we created the Data...

/ March 23, 2017
password management
The woes of password management

The woes of password management

If you’re like anybody who uses computers today, you’re dealing with passwords. I alone have more than 58 just for the websites I use on a regular basis. That doesn’t include any hardware passwords,  Wi-Fi passwords, computer logins, or clients’...

/ March 20, 2017
factory
Ask an MSP Expert: How to create firewall policies for a company

Ask an MSP Expert: How to create firewall policies for a company

Q: With today’s evolving cyber threats, my IT service company is trying to offer our customers more proactive security measures beyond anti-malware and anti-spam filters. To really protect our customers, we want to offer a more sophisticated firewall solution. Once...

/ March 20, 2017