Month: May 2019
Tech Time Warp: The slow rise of video phones
Chances are you’ve used Zoom, Skype, or FaceTime in the past week. Video-conferencing is so entrenched in modern life, it’s hard to understand why a May 30, 1996, announcement by AT&T and Intel about their new PC-based videophone left some...
Cybersecurity Threat Advisory: Separ Malware Steals Credentials
What is the threat? Researchers from Deep Instinct have detected an ongoing phishing campaign being aimed at many organizations located across North America, Southeast Asia, and the Middle East. The campaign has been effectively distributing the credential-stealing malware known as...
The three things MSP buyers are looking for that are not “low price”
At Boot Camp, I shared the research I’d compiled on what clients want from their IT provider. This research was based on examining the responses to a testimonial request e-mail we have our MSP clients send to their best clients....
Increased complexity pushes internal IT teams closer to the breaking point
The decision to rely on a managed service provider (MSP) often comes down to the IT skills, or lack thereof, any organization has at hand. The more complex the IT environment, the thinner the level of expertise that can be...
Cybersecurity Threat Advisory: WordPress Plugin Flaw Allows Complete Website Takeover
What is the threat? A serious vulnerability in WordPress was recently discovered via the specific plugin known as “Simple Social Buttons.” This add-on enables site editors to insert social media sharing buttons throughout their website in an appealing and accessible...
Building a defense from social engineering attacks
Last week Smarter MSP examined the security threat that social engineering poses to organizations of all sizes. Social engineering is a technique that hackers use to gain access to an organization’s network, without having to break down the metaphorical door....
Lessons learned from the 2019 Women of the Channel
Learning is a critical part of building an enduring career in the tech industry. It is important for employees to be open-minded and critical of their own work, so they can learn the lessons they need to succeed. However, the...
Cybersecurity Threat Advisory: Zero-Day Privilege Escalation Vulnerability in Apple’s iOS
What is the threat? Recently, Google’s Project Zero team reported a new zero-day vulnerability discovered in Apple’s iOS. They identified several malicious/fraudulent applications available for download in the app store. These applications leave iPhones susceptible to vulnerabilities that put the...
Survey finds large appetite for SD-WAN change among IT executives
Software-defined wide area networking (SD-WANs) remains one of the fastest growing sectors in IT. In fact, a new survey of 400 IT executives published by Cato Networks, an SD-WAN service delivered via the cloud, indicates that 44 percent of respondents...
Cybersecurity Threat Advisory: Zero Day Microsoft Exchange PrivExchange Vulnerability
What is the threat? Remote attackers can exploit a vulnerability that has been discovered in Microsoft Exchange to gain Domain Controller admin privileges using the credentials of an Exchange Mailbox user. The attacker must exploit a combination of flaws to...