Kevin Williams

All posts by Kevin Williams

Kevin Williams is a journalist based in Ohio. Williams has written for a variety of publications including the Washington Post, New York Times, USA Today, Wall Street Journal, National Geographic and others. He first wrote about the online world in its nascent stages for the now defunct “Online Access” Magazine in the mid-90s.

Lost and hopefully not found (by a hacker)

Lost and hopefully not found (by a hacker)

The combination of people gradually returning to offices and corporate campuses and the proliferation of BYOD (bring your own device) during the pandemic is not only causing headaches for CISOs and MSPs, but it’s also resulting in cybersecurity problems. “We...

/ March 30, 2022 / 10 Comments
Preparing for a state-sponsored attack

Preparing for a state-sponsored attack

As the conflict in Ukraine drags on, some experts fear that the chance of cybersecurity-related incidents will only increase in the USA. Managed Service Providers (MSPs) are well-positioned as the guardians at the gate for many companies and should play...

/ March 24, 2022 / 5 Comments
Data Center security
The important role MSPs play in keeping the data center safe

The important role MSPs play in keeping the data center safe

Data is currency to hackers. “For a hacker, there’s no difference between a stack of $50 bills and a bunch of unguarded PHI (personal health information) or credit card numbers,” says Phil Jefferson, an independent cybersecurity consultant in Fort Worth,...

/ March 21, 2022
Beware the toads

Beware the toads

It is nearly Spring, and as the weather turns warm, one must watch out for TOADS. No, not the kind that catches flies and hops into ponds. These TOADS are more sophisticated, standing for Telephone Oriented Attack Delivery (TOAD). There...

/ March 9, 2022
Beware of Google Chrome complacency

Beware of Google Chrome complacency

Google Chrome is about as common in office spaces as a water cooler or a coffeemaker. Chrome is also becoming king elsewhere, unless the systems are Macs, and Safari is the browser of choice. With its minimalist, crisp interface and...

/ March 2, 2022 / 7 Comments
MSPs and AVs
MSPs and AVs: The opportunities that lie ahead

MSPs and AVs: The opportunities that lie ahead

I recently had the opportunity to tour a factory in Youngstown, Ohio, and was mesmerized by the fleet of small self-driving trucks, or autonomous vehicles (AVs), that crisscrossed the factory floor. One of the supervisors, who had worked at the...

/ February 23, 2022
Cybersecurity is everyone’s responsibility

Cybersecurity is everyone’s responsibility

This post is part of our ongoing conversations with industry experts about the ever-present problem of data breaches. These breaches usually trace back to the security teams, but everyone, even the average user, is considered a stakeholder in cybersecurity. IBM...

/ February 15, 2022 / 1 Comment
Rising data breaches require extra vigilance and awareness training

Rising data breaches require extra vigilance and awareness training

Data breaches increased by 69 percent in 2021 compared to 2020, according to the Identity Theft Resource Center (ITRC) in its annual report on data breaches. According to the report, the most common causes of data breaches were phishing or...

/ February 14, 2022
Securing 5G cloud infrastructure

Securing 5G cloud infrastructure

5G cybersecurity is becoming a hot topic among MSP owners and engineers. Recently, I’ve spoken to many MSP owners who have had questions. As 5G gradually rolls out in markets across the USA and Canada, its arrival will usher in...

/ January 24, 2022 / 6 Comments
Ask an MSP Expert: Should my MSP have its own company vehicles?

Ask an MSP Expert: Should my MSP have its own company vehicles?

Q: I’m an MSP owner and business is booming. In fact, I’m planning on hiring two technicians to assist me in servicing customers. Should I have them take their own cars on service calls or should I purchase company vehicles?...

/ January 19, 2022