MSPs are being used to breach their customers’ networks
Hackers will probe for whatever weak links they can find to breach an enterprise’s network. However, what if the weak link is you, the MSP? The scenario of an MSP as system’s victim instead of the protector is increasingly playing...
Silex is disabling IoT devices as IoT’s growth becomes a security challenge
Recently, MSPs have been getting urgent calls from clients reporting that wireless printers, security cameras, and remote sensors are not working. Others skipped the calls to their MSPs and just bought new devices, thinking there had been a hardware failure. The...
Healthcare organizations need MSPs to serve as guards
Last week, we looked at some of the emerging cybersecurity healthcare hazards in 2019, from ransomware to crypto. As healthcare continues to become more and more connected, the MSP’s role has never been more significant, especially with smaller to medium-sized healthcare...
The healthcare slice of the MSP pie continues to grow
For the second year in a row, the top security niche that MSPs are focusing in on, is the healthcare industry. As hospitals expand and medical wearables are becoming more common, organizations with skeletal IT staffs are looking more and...
Cryptojacking is making a comeback
Black Squid has washed up on the cyber-shores of the United States, after first being spotted in Thailand. Unlike its oceanic counterparts, this cyber squid is destructive. Beincrypto describes the threat like this: It uses tactics such as anti-virtualization, anti-debugging,...
Ask an MSP Expert: How can my MSP prepare for an economic recession?
Q: Right now, we have more business than we can handle, and cash flow is exceeding our projections for the year. Still, I get nervous and worry about the next downturn. Is there something I should be doing now to prepare...
Steganography makes a comeback
Steganography was malware before there was malware. In fact, the term dates back thousands of years and has only recently been used in cyber-circles. The word’s root is derived from the Greek word steganos, which means “covered” or “concealed.” Pre-technological generals used...
Building a defense from social engineering attacks
Last week Smarter MSP examined the security threat that social engineering poses to organizations of all sizes. Social engineering is a technique that hackers use to gain access to an organization’s network, without having to break down the metaphorical door....
Social engineering: a hacker’s most effective weapon
What is the weakest link in your client’s network? It’s not unpatched software (although you should patch) or the unimaginative passwords (although you should change it). The weakest links are humans themselves. It’s Joan in accounting or Stan in human...
Catch hackers with a honeypot in your security service
I once visited an Amish farm where green plastic 2-liter 7-Up bottles dangled from the lower branches of the fruit trees. The bottles were filled about halfway with some sort of liquid. Upon closer inspection, I could see a banana peel...
