Kevin Williams

All posts by Kevin Williams

Kevin Williams is a journalist based in Ohio. Williams has written for a variety of publications including the Washington Post, New York Times, USA Today, Wall Street Journal, National Geographic and others. He first wrote about the online world in its nascent stages for the now defunct “Online Access” Magazine in the mid-90s.

social engineering
Social engineering attacks: What MSPs need to know

Social engineering attacks: What MSPs need to know

As we kick off Cybersecurity Awareness Month, we are highlighting one danger that managed service providers (MSPs) must constantly monitor: social engineering. According to Verizon’s 2024 Data Breach Investigations Report: Social engineering incidents have increased from the previous year largely...

/ October 3, 2024
MSP at the forefront against credential stuffing

MSP at the forefront against credential stuffing

Credential stuffing has been around for a while, and it is exactly what it sounds like: an attack in which hackers use a cache of compromised usernames and passwords to break into a system. However, hackers have recently found new...

/ September 26, 2024
navigate MSP
Insights for navigating potential MSP adversities

Insights for navigating potential MSP adversities

Managed service providers (MSPs) must navigate an increasingly complex cyber world. From dealing with the Internet of Things (IoT), 5G, and ransomware, to managing hardware, education, and training. The intricacies of running a business, both theirs and their clients, can...

/ September 18, 2024
cyber risk
Summer Roundup: Cyber risks for MSPs to monitor

Summer Roundup: Cyber risks for MSPs to monitor

As summer begins its swan song and thoughts begin to turn toward autumn, the Cybersecurity and Infrastructure Security Agency (CISA) has a fresh batch of advisories. Released in August, these advisories highlight the various cyber risks lurking out there, many...

/ September 10, 2024
cyber-physical attack
The cyber-physical attack threat is growing

The cyber-physical attack threat is growing

In most cases, a breach involves hackers stealing data they can then resell on the dark web. As a result, distributed denial-of-service (DDoS) attacks and other attacks used to steal data are part of a hacker’s repertoire that managed service...

/ August 29, 2024
e-waste
MSP tips to properly dispose e-waste

MSP tips to properly dispose e-waste

Managed service providers (MSPs) have a lot to do when it comes to keeping their clients safe. For example, they must watch patches, firewalls, IoT, and even dumpsters. While it is illegal to toss electric waste (e-waste) into the dumpster...

/ August 22, 2024
cybersecurity
Will MSPs have more license requirements in their future?

Will MSPs have more license requirements in their future?

In 2019, Singapore became the first country in the world to require cybersecurity professionals to undergo a licensing and certification process. The trend has been slow to catch on. However, this year, Ghana and Malaysia joined Singapore in creating certification...

/ August 15, 2024
DORA
Ready, set, DORA

Ready, set, DORA

The Digital Operational Resilience Act (DORA) has been slowly rolling out in Europe since 2023, as I highlighted in this post back in March. By January 2025, it will be in full effect. We could make cheeky comments about Dora...

/ August 2, 2024
Mobile devices
MSPs must prioritize mobile device security

MSPs must prioritize mobile device security

Last week, we had an overview of the increasing concerns and security challenges surrounding mobile devices. This week, we continue the conversation about mobile devices with Eric O’Neill. Eric is a former FBI counterterrorism and counterintelligence operative, cybersecurity keynote speaker,...

/ July 25, 2024
Mobile device threats: How serious are they?

Mobile device threats: How serious are they?

No matter how well a managed service provider (MSP) secures a client’s network, none of that matters if a hacker can gain access via a mobile device. According to statistics, mobile devices are an increasingly attractive target for hackers. Based...

/ July 18, 2024