Category: Featured
Email threat types: Domain Impersonation
Domain impersonation, also known as typosquatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate domains, such as Barracudamsp.com, by creating domains that appear similar. Such a domain might be accessed by a user typing the...
Tech Time Warp: Credit card companies put PCI compliance in place
We were headed toward a nearly cashless society anyway, but the COVID-19 pandemic and the rise of “contactless” transactions is likely the final push over the edge. Every time you place a takeout order via a mobile app, you’re putting...
Helping your clients understand their customers better
The pandemic has changed the way we do business. Most of your clients probably aren’t meeting customers in person, or if they are, it’s with minimal contact as possible. As this new way of conducting business takes hold, much of...
Survey unveils edge computing opportunity for MSPs
A global survey of 1,652 individuals from a broad set of industries and organizations published this week by Eclipse Foundation, a consortium that promotes adoption of open source tools and platforms, shows the level of diversity among edge computing platforms...
Perfect your LinkedIn profile, generate more leads
Previously, I wrote a piece called “Can MSPs really use LinkedIn for lead generation? Absolutely – and here’s how.” It’s something I still feel incredibly strong about, and it’s also a perspective that I think has been reinforced by everything currently...
MSPs and election cybersecurity
MSPs have emerged as central players in the democracy machinery. And after a rash of recent attacks on MSPs, some worry that MSPs may face a new challenge in election cybersecurity for the United States’ upcoming Presidential elections. Tim Davis,...
Email threat types: Data exfiltration
Data exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices. The stolen data is transferred from the victim to a control server or some other device that is controlled...
The Creeper and the Reaper make cybersecurity history
“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”
Ask an MSP Expert: Overcoming human error to secure the cloud
Data breaches in the cloud are becoming more common, impacting industry giants and small players alike, and MSPs now have to dig deeper to prevent them.
Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”
Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...
