Month: August 2019

Highlights from ChannelCon 2019

Highlights from ChannelCon 2019

Barracuda MSP was in full force at CompTIA’s ChannelCon 2019. Not only did we have a large team, comprised of diverse backgrounds from marketing and channel development to product management, but we also participated in various different aspects of the...

/ August 15, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Supplemental Advisory for the BlueKeep Vulnerability

Cybersecurity Threat Advisory: Supplemental Advisory for the BlueKeep Vulnerability

Advisory Overview: Microsoft recently undertook efforts to protect Windows desktops and servers against a threat known as BlueKeep, a vulnerability in Remote Desktop Protocol – a tool used to remotely access a Windows desktop or server. During these efforts, Microsoft...

/ August 14, 2019
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019 / 1 Comment
Survey shines light on chronic need for actionable cybersecurity intelligence

Survey shines light on chronic need for actionable cybersecurity intelligence

A survey of 577 IT and IT security practitioners in the U.S. conducted by The Ponemon Institute on behalf of AttackIQ, a provider of security testing tools, suggests there’s a major opportunity for managed service providers (MSPs) to provide security...

/ August 13, 2019
To grow your MSP business, you need to lead by example

To grow your MSP business, you need to lead by example

As the owner of a managed service business, do you understand the importance of leading by example? In an previous article, I wrote about why your MSP should eat its own dog food. Of course, this doesn’t mean you should...

/ August 12, 2019
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019 / 1 Comment
Tech Time Warp: Was the Welchia Worm well-intended?

Tech Time Warp: Was the Welchia Worm well-intended?

As the old saying goes, two wrongs don’t make a right — especially if the second “wrong” is a computer worm, albeit a benevolent one. In August 2003, hundreds of thousands of PCs were infected by the Blaster worm, which...

/ August 9, 2019 / 1 Comment
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: A New ‘Arbitrary File Copy’ Vulnerability Affects ProFTPD

Cybersecurity Threat Advisory: A New ‘Arbitrary File Copy’ Vulnerability Affects ProFTPD

Advisory Overview A popular and widely used server software package called ProFTPd has been found to have a vulnerability. This software runs on many different types of servers, including Windows, UNIX, and Linux; and provides File Transfer Protocol (FTP) services....

/ August 8, 2019
Software licensing chaos creates unique opportunity for MSPs

Software licensing chaos creates unique opportunity for MSPs

It’s no secret that software licensing models across the IT industry are chaotic. Software providers typically offer a mix of licensing options, spanning everything from subscriptions and usage-based licensing models, to traditional perpetual licenses that enable organizations to continue to...

/ August 8, 2019
Increased connectivity leads to increased security needs

Increased connectivity leads to increased security needs

When it comes to IoT, there’s no limit to the thoughts from experts and security professionals about strategies for adapting to the rapidly changing connectivity landscape in the average office. This landscape is changing daily. One statement we can make with...

/ August 7, 2019