
Are banks doing enough to combat cybercrime?
Last week we explored the security vulnerabilities posed by banks using legacy systems and how MSPs can play a mitigation role. This week, we explore the steps banks and their security teams should be taking today to prevent the next...

MSPs should start investing in the banking industry
Financial firms have long been at the forefront of malware attacks. In fact, a report released this year shows that a full 25 percent of attacks are aimed at businesses in the finance industry. The reasons for “virtual bank robberies”...

MSPs can go to the dogs
Everyone knows about the importance of safeguarding health data, and the incredible connectivity that is transforming healthcare. Hospitals and doctors’ offices are now cyber hubs dispensing medical wearables, promoting telemedicine, and building connected clinics. However, in their rush to corner...

Are IoT devices serious security threats?
IoT is transforming offices, campuses, and factories, but also brings warnings that the cloud-connected security camera monitoring the storage room could be a threat. How realistic are these warnings, and how much is hyperbole? For answers, Smarter MSP checked in...

Ask an MSP Expert: How do I make sure my Office 365 data is safe?
Q: We have clients who run almost their entire business on Office 365. However, most of them decline additional security services because they think that “Microsoft has my back,” but how true is that? To answer this question, Smarter MSP...

Five off-the-radar security threats
Complacency is a formidable enemy. You have a robust patching regimen, an educational component to your MSP offerings, pen testing, and you segment data so that an attack on your client’s system can be contained and quarantined. It’s easy to...

A low-tech standby for cybersecurity
With all the cybersecurity tools in the arsenal of the average MSP, there’s one that often gets understandably overlooked: paper and marker. Yes, patching, anti-virus protection, double authentication, and firewalls are the most crucial elements of your cybersecurity regime, but...

Supply chain attacks on the rise
You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

Increased connectivity leads to increased security needs
When it comes to IoT, there’s no limit to the thoughts from experts and security professionals about strategies for adapting to the rapidly changing connectivity landscape in the average office. This landscape is changing daily. One statement we can make with...

Cities of all sizes are being targeted by ransomware attacks
Last year, it was Atlanta that was brought to its knees by a ransomware attack, sending the city reeling for weeks. This year, it was Baltimore’s turn. The ranks of municipal ransomware victims looks very different.