Kevin Williams

All posts by Kevin Williams

Kevin Williams is a journalist based in Ohio. Williams has written for a variety of publications including the Washington Post, New York Times, USA Today, Wall Street Journal, National Geographic and others. He first wrote about the online world in its nascent stages for the now defunct “Online Access” Magazine in the mid-90s.

MSPs can protect self-driving cars and their passengers

MSPs can protect self-driving cars and their passengers

Autonomous vehicles are here to stay, and MSPs have a significant opportunity to become guardians of their security. Many MSPs already have industrial accounts, and that is where the most significant advances are occurring. A survey last year showed that...

/ July 17, 2019
Ask an MSP Expert: How can our MSP implement a robust AI program?

Ask an MSP Expert: How can our MSP implement a robust AI program?

Q: AI is growing in popularity. How can my 10-employee MSP best leverage AI in day-to-day business? Could directly investing in more AI save me from having to increase my number of staff?  Don’t put away your human resources hat...

/ July 15, 2019
MSPs are being used to breach their customers’ networks

MSPs are being used to breach their customers’ networks

Hackers will probe for whatever weak links they can find to breach an enterprise’s network. However, what if the weak link is you, the MSP? The scenario of an MSP as system’s victim instead of the protector is increasingly playing...

/ July 10, 2019
Silex is disabling IoT devices as IoT’s growth becomes a security challenge

Silex is disabling IoT devices as IoT’s growth becomes a security challenge

Recently, MSPs have been getting urgent calls from clients reporting that wireless printers, security cameras, and remote sensors are not working. Others skipped the calls to their MSPs and just bought new devices, thinking there had been a hardware failure. The...

/ July 3, 2019
Healthcare organizations need MSPs to serve as guards

Healthcare organizations need MSPs to serve as guards

Last week, we looked at some of the emerging cybersecurity healthcare hazards in 2019, from ransomware to crypto. As healthcare continues to become more and more connected, the MSP’s role has never been more significant, especially with smaller to medium-sized healthcare...

/ June 26, 2019
The healthcare slice of the MSP pie continues to grow

The healthcare slice of the MSP pie continues to grow

For the second year in a row, the top security niche that MSPs are focusing in on, is the healthcare industry. As hospitals expand and medical wearables are becoming more common, organizations with skeletal IT staffs are looking more and...

/ June 19, 2019
Cryptojacking is making a comeback

Cryptojacking is making a comeback

Black Squid has washed up on the cyber-shores of the United States, after first being spotted in Thailand. Unlike its oceanic counterparts, this cyber squid is destructive. Beincrypto describes the threat like this: It uses tactics such as anti-virtualization, anti-debugging,...

/ June 12, 2019
Ask an MSP Expert: How can my MSP prepare for an economic recession?

Ask an MSP Expert: How can my MSP prepare for an economic recession?

Q: Right now, we have more business than we can handle, and cash flow is exceeding our projections for the year. Still, I get nervous and worry about the next downturn. Is there something I should be doing now to prepare...

/ June 10, 2019
Steganography makes a comeback

Steganography makes a comeback

Steganography was malware before there was malware. In fact, the term dates back thousands of years and has only recently been used in cyber-circles. The word’s root is derived from the Greek word steganos, which means “covered” or “concealed.” Pre-technological generals used...

/ June 5, 2019
Building a defense from social engineering attacks

Building a defense from social engineering attacks

Last week Smarter MSP examined the security threat that social engineering poses to organizations  of all sizes. Social engineering is a technique that hackers use to gain access to  an organization’s network, without having to break down the metaphorical door....

/ May 29, 2019