Month: August 2020
Cybersecurity Threat Advisory: Team Viewer Vulnerability
Advisory Overview A vulnerability has been discovered in remote desktop connection application “TeamViewer” that can allow an attacker to steal the login information (username and hashed password) of a user. This can allow the attacker to crack the stolen password...
Municipal contracts and the cybersecurity data to land them
A recent note came to me from a Smarter MSP reader about municipal contracts, and what types of cybersecurity data should be used when trying to land municipal contracts. Assuming they are not the only one with questions on this...
Widespread cloud configuration issues create opportunity for MSPs
The crux of the problem with cloud security has very little to do with the platforms on which applications are deployed. The real issue is the amount of cybersecurity expertise the people deploying cloud applications don’t have. Most cloud applications...
Keep your prices off your MSP website
Editors note: This is part one of a two-part series on using your website to tell a story of value over price. Part two, “What your MSP website should focus on instead” will be published next week. Stay tuned. Recently,...
Free communications tools abound
By now, we all know that the pandemic has forced many businesses to shut down offices and move to work-from-home environments. This has made communication with co-workers, clients, partners and other key stakeholders even more critical. When you can’t talk...
How your MSP business can thrive in a crisis
“If you can keep your head when everybody round you is losing his, then it is very probable that you don’t understand the situation,” goes the old saying. Well, we disagree. Staying calm in a crisis isn’t easy, but situations...
Cybersecurity Threat Advisory: Two Microsoft Zero-Day Vulnerabilities
Advisory Overview Microsoft has addressed two zero-day vulnerabilities in this week’s rollout of security patches. One of the zero-day vulnerabilities could allow an attacker to bypass security features intended to prevent improperly signed files from being loaded; the other zero-day...
Pioneers in Tech: Hedy Lamarr, Hollywood’s Golden Age Inventor
Even if you’re not an old movie buff, the name Hedy Lamarr likely conjures images of glamorous red carpets, camera flashes, and the Hollywood sign. After all, Lamarr captivated audiences of the 1930s and 1940s with her beauty—even serving as...
Cybersecurity Threat Advisory: Pulse Secure VPN Server Data Leak
Advisory Overview Over 900+ Pulse VPN servers were breached and had their data leaked online. The data includes plaintext username, passwords, IP addresses, user session cookies, administrator details and private encryption keys. Technical detail and additional information What is the...
Another cybersecurity view from Africa
A couple of weeks ago, I wrote about how South Africa’s MSPs and IT specialists are battling the pandemic and WFH trends. After the article ran, I had the opportunity to speak further on this topic with Dr. Uche Mbanaso,...