Category: Featured

Back-to-school highlights the importance of cybersecurity resiliency for educators
The rumbling yellow school buses and children at recess clambering on jungle gyms are becoming familiar sights. Schools are back in session across most of the country and while students have been having fun over the summer, hackers have been...

Cybersecurity Threat Advisory: Social engineering attacks targeting Okta
Today’s Cybersecurity Threat Advisory highlights Okta, who in recent weeks has experienced social engineering attacks by threat actors looking to attain highly privileged roles within Okta’s accounts. The company has warned about social engineering attacks targeting IT service desk agents...

CISA looks to rally RMM community to improve MSP security
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is now focusing on fixing systematic risks in the remote monitoring and management (RMM) tools that most managed service providers (MSPs) employ. The agency, as part of a Joint Cyber Defense Collaborative...

What exactly is killware, and why is it the next major cyberthreat?
Given the surge of incidents within the past decade, many people are becoming familiar with ransomware and data breaches. However, a new type of cyberattack known as killware has emerged in recent years, and it’s now a major security issue for organizations....

Tech Time Warp: Woz dabbles in music festivals
In this week’s Tech Time Warp we discuss how we all know Steve Wozniak as the co-founder of Apple—but did you know Woz also dabbled in rock festivals? Forty-one years ago, while on hiatus from Apple after a plane crash,...

Pushing the ‘M’ in MSP
At times, it is easy to forget what the actuality of being an MSP is. The provision of one or more services as described in the contract is apparent – and this should be conducted in a way that makes...

Cybersecurity Threat Advisory: Vulnerabilities found in Juniper firewalls
Today’s Cybersecurity Threat Advisory involves proof-of-concept exploit code that has been publicly released in Juniper SRX firewalls. Using the proof-of-concept exploit code can allow unauthenticated attackers access to remotely execute code in unpatched Juniper JunOS devices. This news comes after...

Whiffy Recon highlights geolocation vulnerabilities
Geolocation devices are great for keeping tabs on your teenagers or finding the quickest route to the campsite. However, geolocation technology is increasingly a weapon wielded by cybercriminals, and protecting against its use is problematic. Why are geolocation devices a...

Cybersecurity Threat Advisory: 3 High-severity CISCO vulnerabilities discovered
In the latest Cybersecurity Threat Advisory, Cisco has addressed three high-severity vulnerabilities within its NX-OS and FXOS software, which have the potential to trigger denial-of-service (DoS) conditions. These vulnerabilities could be exploited by malicious actors to disrupt the normal functioning...

AI drives the need for managed cybersecurity resiliency services
It is becoming more apparent that phishing attacks that compromise credentials are linked to the rise of artificial intelligence (AI). These attacks will only increase in volume and sophistication, and more organizations must focus on limiting the scope of damage...