Kevin Williams

All posts by Kevin Williams

Kevin Williams is a journalist based in Ohio. Williams has written for a variety of publications including the Washington Post, New York Times, USA Today, Wall Street Journal, National Geographic and others. He first wrote about the online world in its nascent stages for the now defunct “Online Access” Magazine in the mid-90s.

MSPs are good medicine for hospitals

MSPs are good medicine for hospitals

Imagine a senior government official with a pacemaker and the chilling scenarios that could play out if a hacker could overcome this device’s defenses. It sounds like something ripped out of a movie script, but it’s slowly creeping closer to...

/ October 15, 2018
Biometric conversations for MSPs

Biometric conversations for MSPs

Passwords are a cornerstone of the various security deployments that MSPs put in place for their customers. Password technology, however, has changed little since the dawn of the modern computer age. How long before the password is replaced with something...

/ October 10, 2018
The pros and cons of biometrics

The pros and cons of biometrics

A new malware targeting banking customers in Brazil calls into question the security of biometric account protections. Interestingly, the sophisticated attack – dubbed as CamuBot, uses very low-tech, retro ways to target its victims. CamuBot was recently described in ThreatPost...

/ October 3, 2018
Ask an MSP Expert: How can we expand our IT service business internationally?

Ask an MSP Expert: How can we expand our IT service business internationally?

Q:  The managed service business is very competitive and sometimes the United States feels saturated with IT providers. My business is strong and I’m primed to grow it. Are there any options for expanding internationally? Good question! For insights on...

/ October 1, 2018
The dangers lurking in SMB networks

The dangers lurking in SMB networks

The most significant risks to your SMB customers don’t always come from threats with catchy names like Wanna Cry. Instead, the biggest threats can come from sources with names that are often more mundane like “Paula in Accounting” or “Dave...

/ September 26, 2018
Fileless attacks are lurking threats

Fileless attacks are lurking threats

You’ve installed all the latest antivirus programs and firewalls for your SMB clients, and their networks are safe and sound. When things are working well, a calm status quo makes everyone happy. Unfortunately, a placid surface doesn’t necessarily mean there’s...

/ September 18, 2018
BYOD: The good and the bad

BYOD: The good and the bad

“As long as a smartphone is allowed into an organization, there is no way of controlling how an employee uses the technology.” – Dr. Matthew Warren Smarter MSP recently looked at some of the security concerns inherent with BYOD (Bring...

/ September 12, 2018
Ask an MSP Expert: Navigating the bid process for government clients

Ask an MSP Expert: Navigating the bid process for government clients

Q:  My MSP has never gone after government business, I have wanted to, but I keep getting scared away by the whole bidding process. How complicated is it? An excellent MSP opportunity may be hiding in plain sight. Many MSPs...

/ September 10, 2018
Email bombing is making a quick comeback

Email bombing is making a quick comeback

I have an old AOL email account that I haven’t opened in seven years — maybe even ten. Right now, it’s a swamp of spam. My AOL could be email bombed, and I wouldn’t know or care. “Email bombing,” despite...

/ August 29, 2018
Foreshadow foreshadowing trouble ahead?

Foreshadow foreshadowing trouble ahead?

Foreshadow has joined Spectre and Meltdown on the list of Intel’s announced chip security vulnerabilities this year. Intel announced the vulnerability and released a well-produced video explaining the lapse and recommended fixes. While Intel’s response to Spectre and Meltdown earlier...

/ August 21, 2018