Kevin Williams

All posts by Kevin Williams

Kevin Williams is a journalist based in Ohio. Williams has written for a variety of publications including the Washington Post, New York Times, USA Today, Wall Street Journal, National Geographic and others. He first wrote about the online world in its nascent stages for the now defunct “Online Access” Magazine in the mid-90s.

Increased connectivity leads to increased security needs

Increased connectivity leads to increased security needs

When it comes to IoT, there’s no limit to the thoughts from experts and security professionals about strategies for adapting to the rapidly changing connectivity landscape in the average office. This landscape is changing daily. One statement we can make with...

/ August 7, 2019
Cities of all sizes are being targeted by ransomware attacks

Cities of all sizes are being targeted by ransomware attacks

Last year, it was Atlanta that was brought to its knees by a ransomware attack, sending the city reeling for weeks. This year, it was Baltimore’s turn. The ranks of municipal ransomware victims looks very different.

/ July 31, 2019
Malware resurges with an advertising disguise

Malware resurges with an advertising disguise

Online advertisements can be irresistible. With a TV ad, you have to endure a 30-second spot pushing Corn Flakes or denture cream, whether you have any interest in those items or not. Online ads, however, are targeted to your interests....

/ July 24, 2019
MSPs can protect self-driving cars and their passengers

MSPs can protect self-driving cars and their passengers

Autonomous vehicles are here to stay, and MSPs have a significant opportunity to become guardians of their security. Many MSPs already have industrial accounts, and that is where the most significant advances are occurring. A survey last year showed that...

/ July 17, 2019
Ask an MSP Expert: How can our MSP implement a robust AI program?

Ask an MSP Expert: How can our MSP implement a robust AI program?

Q: AI is growing in popularity. How can my 10-employee MSP best leverage AI in day-to-day business? Could directly investing in more AI save me from having to increase my number of staff?  Don’t put away your human resources hat...

/ July 15, 2019
MSPs are being used to breach their customers’ networks

MSPs are being used to breach their customers’ networks

Hackers will probe for whatever weak links they can find to breach an enterprise’s network. However, what if the weak link is you, the MSP? The scenario of an MSP as system’s victim instead of the protector is increasingly playing...

/ July 10, 2019
Silex is disabling IoT devices as IoT’s growth becomes a security challenge

Silex is disabling IoT devices as IoT’s growth becomes a security challenge

Recently, MSPs have been getting urgent calls from clients reporting that wireless printers, security cameras, and remote sensors are not working. Others skipped the calls to their MSPs and just bought new devices, thinking there had been a hardware failure. The...

/ July 3, 2019
Healthcare organizations need MSPs to serve as guards

Healthcare organizations need MSPs to serve as guards

Last week, we looked at some of the emerging cybersecurity healthcare hazards in 2019, from ransomware to crypto. As healthcare continues to become more and more connected, the MSP’s role has never been more significant, especially with smaller to medium-sized healthcare...

/ June 26, 2019
The healthcare slice of the MSP pie continues to grow

The healthcare slice of the MSP pie continues to grow

For the second year in a row, the top security niche that MSPs are focusing in on, is the healthcare industry. As hospitals expand and medical wearables are becoming more common, organizations with skeletal IT staffs are looking more and...

/ June 19, 2019
Cryptojacking is making a comeback

Cryptojacking is making a comeback

Black Squid has washed up on the cyber-shores of the United States, after first being spotted in Thailand. Unlike its oceanic counterparts, this cyber squid is destructive. Beincrypto describes the threat like this: It uses tactics such as anti-virtualization, anti-debugging,...

/ June 12, 2019