Month: July 2024

Transparent data
Tip Tuesday: Enhance customer trust with data transparency

Tip Tuesday: Enhance customer trust with data transparency

If you’re like many managed service providers (MSPs), you’ve likely run into data transparency issues — even if you didn’t realize it then. As it turns out, this concept is fundamental to privacy and data security. What should you do...

/ July 16, 2024
Report
Achieving IT-business alignment is a must for organizations

Achieving IT-business alignment is a must for organizations

A report published by NTT Data finds only roughly half (51 percent) of organizations have fully aligned their technology to their business strategy needs. An additional 39 percent report that they partially align. The report is based on an analysis...

/ July 16, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Cybersecurity Threat Advisory: Critical Citrix NetScaler vulnerabilities

Citrix has identified two critical vulnerabilities in its NetScaler products, including NetScaler Console, NetScaler SVM, and NetScaler Agent. These vulnerabilities can allow unauthorized access to sensitive data and lead to denial of service (DoS) attacks. Read this Cybersecurity Threat Advisory...

/ July 15, 2024
Threat Spotlight: Attackers abuse URL protection services to mask phishing links

Threat Spotlight: Attackers abuse URL protection services to mask phishing links

As defenders tighten their grip on the tools and techniques used in phishing attacks, adversaries are finding new ways to bypass detection and target potential victims. For example, many phishing attacks rely on convincing users to click on a compromised link...

/ July 15, 2024
Pioneers in Tech
Pioneers in Tech: Nikola Tesla’s vision for wireless communication

Pioneers in Tech: Nikola Tesla’s vision for wireless communication

This edition of Pioneers in Tech looks at the legend of Nikola Tesla—not only do electric cars bear his name, but also his alternating-current (AC) electric system remains the basis of electricity today. Plus, the “Tesla coil” he invented is...

/ July 12, 2024
PHI Hackers
Tips for MSPs to protect PHI from hackers

Tips for MSPs to protect PHI from hackers

Hackers love personal healthcare information (PHI). Health records contain a trove of highly saleable information that can fetch high prices on the dark web. Enlance Health found that in the past two years alone, over 800 security breaches targeting healthcare...

/ July 12, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Vulnerabilities found in Gogs Git service

Cybersecurity Threat Advisory: Vulnerabilities found in Gogs Git service

Four vulnerabilities were found in Gogs Git Service, impacting multiple versions up to 0.13.0. The vulnerabilities can impact the confidentiality and availability of data, however, code execution is possible. Continue reading this Cybersecurity Threat Advisory to protect your accounts and...

/ July 11, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Emergence of Eldorado RaaS

Cybersecurity Threat Advisory: Emergence of Eldorado RaaS

A new ransomware-as-a-service (RaaS), known as Eldorado, recently emerged, introducing locker variants for both VMware ESXi and Windows systems. Eldorado has rapidly demonstrated its ability to inflict severe damage on victims’ data, reputation, and business continuity. Review this Cybersecurity Threat...

/ July 10, 2024
Microsoft 365
Is your client’s Microsoft 365 data protected?

Is your client’s Microsoft 365 data protected?

According to some estimates, over 1 million companies use Microsoft 365 (M365). Because they’re working with a trusted brand, businesses often think their data stored on the platform is protected by Microsoft, but that is not the case – Microsoft doesn’t natively...

/ July 10, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: RCE vulnerability in Ghostscript

Cybersecurity Threat Advisory: RCE vulnerability in Ghostscript

A Ghostscript remote code execution (RCE) vulnerability, tracked as CVE-2024-29510 (with a CVSS rating of 5.5), is currently being exploited. This exploit can allow attackers to bypass the -dSAFER sandbox and execute code remotely. Review this Cybersecurity Threat Advisory to...

/ July 9, 2024