Month: May 2019

Tech Time Warp: The slow rise of video phones

Tech Time Warp: The slow rise of video phones

Chances are you’ve used Zoom, Skype, or FaceTime in the past week. Video-conferencing is so entrenched in modern life, it’s hard to understand why a May 30, 1996, announcement by AT&T and Intel about their new PC-based videophone left some...

/ May 31, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Separ Malware Steals Credentials

Cybersecurity Threat Advisory: Separ Malware Steals Credentials

What is the threat? Researchers from Deep Instinct have detected an ongoing phishing campaign being aimed at many organizations located across North America, Southeast Asia, and the Middle East. The campaign has been effectively distributing the credential-stealing malware known as...

/ May 30, 2019
The three things MSP buyers are looking for that are not “low price”

The three things MSP buyers are looking for that are not “low price”

At Boot Camp, I shared the research I’d compiled on what clients want from their IT provider. This research was based on examining the responses to a testimonial request e-mail we have our MSP clients send to their best clients....

/ May 30, 2019
Increased complexity pushes internal IT teams closer to the breaking point

Increased complexity pushes internal IT teams closer to the breaking point

The decision to rely on a managed service provider (MSP) often comes down to the IT skills, or lack thereof, any organization has at hand. The more complex the IT environment, the thinner the level of expertise that can be...

/ May 30, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: WordPress Plugin Flaw Allows Complete Website Takeover

Cybersecurity Threat Advisory: WordPress Plugin Flaw Allows Complete Website Takeover

What is the threat? A serious vulnerability in WordPress was recently discovered via the specific plugin known as “Simple Social Buttons.” This add-on enables site editors to insert social media sharing buttons throughout their website in an appealing and accessible...

/ May 29, 2019
Building a defense from social engineering attacks

Building a defense from social engineering attacks

Last week Smarter MSP examined the security threat that social engineering poses to organizations  of all sizes. Social engineering is a technique that hackers use to gain access to  an organization’s network, without having to break down the metaphorical door....

/ May 29, 2019
Lessons learned from the 2019 Women of the Channel

Lessons learned from the 2019 Women of the Channel

Learning is a critical part of building an enduring career in the tech industry. It is important for employees to be open-minded and critical of their own work, so they can learn the lessons they need to succeed. However, the...

/ May 29, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zero-Day Privilege Escalation Vulnerability in Apple’s iOS

Cybersecurity Threat Advisory: Zero-Day Privilege Escalation Vulnerability in Apple’s iOS

What is the threat? Recently, Google’s Project Zero team reported a new zero-day vulnerability discovered in Apple’s iOS. They identified several malicious/fraudulent applications available for download in the app store. These applications leave iPhones susceptible to vulnerabilities that put the...

/ May 28, 2019
Survey finds large appetite for SD-WAN change among IT executives

Survey finds large appetite for SD-WAN change among IT executives

Software-defined wide area networking (SD-WANs) remains one of the fastest growing sectors in IT. In fact, a new survey of 400 IT executives published by Cato Networks, an SD-WAN service delivered via the cloud, indicates that 44 percent of respondents...

/ May 28, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zero Day Microsoft Exchange PrivExchange Vulnerability

Cybersecurity Threat Advisory: Zero Day Microsoft Exchange PrivExchange Vulnerability

What is the threat? Remote attackers can exploit a vulnerability that has been discovered in Microsoft Exchange to gain Domain Controller admin privileges using the credentials of an Exchange Mailbox user. The attacker must exploit a combination of flaws to...

/ May 27, 2019