The cyber-physical attack threat is growing
In most cases, a breach involves hackers stealing data they can then resell on the dark web. As a result, distributed denial-of-service (DDoS) attacks and other attacks used to steal data are part of a hacker’s repertoire that managed service...
MSP tips to properly dispose e-waste
Managed service providers (MSPs) have a lot to do when it comes to keeping their clients safe. For example, they must watch patches, firewalls, IoT, and even dumpsters. While it is illegal to toss electric waste (e-waste) into the dumpster...
Will MSPs have more license requirements in their future?
In 2019, Singapore became the first country in the world to require cybersecurity professionals to undergo a licensing and certification process. The trend has been slow to catch on. However, this year, Ghana and Malaysia joined Singapore in creating certification...
Ready, set, DORA
The Digital Operational Resilience Act (DORA) has been slowly rolling out in Europe since 2023, as I highlighted in this post back in March. By January 2025, it will be in full effect. We could make cheeky comments about Dora...
MSPs must prioritize mobile device security
Last week, we had an overview of the increasing concerns and security challenges surrounding mobile devices. This week, we continue the conversation about mobile devices with Eric O’Neill. Eric is a former FBI counterterrorism and counterintelligence operative, cybersecurity keynote speaker,...
Mobile device threats: How serious are they?
No matter how well a managed service provider (MSP) secures a client’s network, none of that matters if a hacker can gain access via a mobile device. According to statistics, mobile devices are an increasingly attractive target for hackers. Based...
Tips for MSPs to protect PHI from hackers
Hackers love personal healthcare information (PHI). Health records contain a trove of highly saleable information that can fetch high prices on the dark web. Enlance Health found that in the past two years alone, over 800 security breaches targeting healthcare...
Summer reading: Four must-read cybersecurity titles
As a journalist, I’m always writing. I also read a lot, and for someone who writes about cybersecurity, I read A LOT of cybersecurity books. While these are not precisely gripping beach reads, I have read some intriguing cybersecurity books...
Blockchain: The cybersecurity tool MSPs should keep an eye on
With cyber threats coming from all directions, managed service providers (MSPs) need as many mitigation measures as possible. One often overlooked area is the emergence of blockchain technology as a cybersecurity tool. Several software solutions incorporate blockchain and have become...
Staying cyber safe with CISA this summer
As sure as fireflies and fireworks mean summer, so do Cybersecurity and Infrastructure Security Agency (CISA) warnings and alerts. With parents shuttling kids to day camps, pool parties, and Disney World, summer is a prime time for cybercriminals to make...