Month: August 2020

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Team Viewer Vulnerability

Cybersecurity Threat Advisory: Team Viewer Vulnerability

Advisory Overview A vulnerability has been discovered in remote desktop connection application “TeamViewer” that can allow an attacker to steal the login information (username and hashed password) of a user. This can allow the attacker to crack the stolen password...

/ August 20, 2020
Municipal contracts and the cybersecurity data to land them

Municipal contracts and the cybersecurity data to land them

A recent note came to me from a Smarter MSP reader about municipal contracts, and what types of cybersecurity data should be used when trying to land municipal contracts. Assuming they are not the only one with questions on this...

/ August 20, 2020
Widespread cloud configuration issues create opportunity for MSPs

Widespread cloud configuration issues create opportunity for MSPs

The crux of the problem with cloud security has very little to do with the platforms on which applications are deployed. The real issue is the amount of cybersecurity expertise the people deploying cloud applications don’t have. Most cloud applications...

/ August 19, 2020
Keep your prices off your MSP website

Keep your prices off your MSP website

Editors note: This is part one of a two-part series on using your website to tell a story of value over price. Part two, “What your MSP website should focus on instead” will be published next week. Stay tuned. Recently,...

/ August 18, 2020
Free communications tools abound

Free communications tools abound

By now, we all know that the pandemic has forced many businesses to shut down offices and move to work-from-home environments. This has made communication with co-workers, clients, partners and other key stakeholders even more critical. When you can’t talk...

/ August 18, 2020
How your MSP business can thrive in a crisis

How your MSP business can thrive in a crisis

“If you can keep your head when everybody round you is losing his, then it is very probable that you don’t understand the situation,” goes the old saying. Well, we disagree. Staying calm in a crisis isn’t easy, but situations...

/ August 17, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Two Microsoft Zero-Day Vulnerabilities

Cybersecurity Threat Advisory: Two Microsoft Zero-Day Vulnerabilities

Advisory Overview Microsoft has addressed two zero-day vulnerabilities in this week’s rollout of security patches. One of the zero-day vulnerabilities could allow an attacker to bypass security features intended to prevent improperly signed files from being loaded; the other zero-day...

/ August 14, 2020
Pioneers in Tech: Hedy Lamarr, Hollywood’s Golden Age Inventor

Pioneers in Tech: Hedy Lamarr, Hollywood’s Golden Age Inventor

Even if you’re not an old movie buff, the name Hedy Lamarr likely conjures images of glamorous red carpets, camera flashes, and the Hollywood sign. After all, Lamarr captivated audiences of the 1930s and 1940s with her beauty—even serving as...

/ August 14, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Pulse Secure VPN Server Data Leak

Cybersecurity Threat Advisory: Pulse Secure VPN Server Data Leak

Advisory Overview Over 900+ Pulse VPN servers were breached and had their data leaked online. The data includes plaintext username, passwords, IP addresses, user session cookies, administrator details and private encryption keys. Technical detail and additional information What is the...

/ August 13, 2020
Another cybersecurity view from Africa

Another cybersecurity view from Africa

A couple of weeks ago, I wrote about how South Africa’s MSPs and IT specialists are battling the pandemic and WFH trends. After the article ran, I had the opportunity to speak further on this topic with Dr. Uche Mbanaso,...

/ August 13, 2020