Category: Security

Have businesses learned their lesson from the Target breach?

Have businesses learned their lesson from the Target breach?

This month marks five years since Target announced the data breach that exposed 70 million customers’ credit card numbers and banking information.

/ February 20, 2019
MSPs need to deliver better employee training due to the rise of spear phishing

MSPs need to deliver better employee training due to the rise of spear phishing

For businesses and the MSPs that serve them, achieving effective IT security requires a strategy with several layers of defense. To thwart potential breaches, most organizations understand that – at a minimum – endpoint access should be tightly controlled, data...

/ February 18, 2019
Ask an MSP Expert: Is 24/7 monitoring necessary for MSPs?

Ask an MSP Expert: Is 24/7 monitoring necessary for MSPs?

Q: I’m the President of a small MSP in Wisconsin and I’m proud of our customer-service and problem-solving skills. However, my last tech goes home for the night at 11 p.m. and if a customer’s servers crash after that point,...

/ February 18, 2019 / 1 Comment
Can sandboxing protect your client’s business?

Can sandboxing protect your client’s business?

When one thinks of a sandbox, what comes to mind are idyllic images of kids playing with buckets, shovels, and miniature-bulldozers on a pleasant summer day. A solid sandbox is a way to contain the kids to a safe area,...

/ February 13, 2019
Coming to terms with offering managed security services

Coming to terms with offering managed security services

Cybersecurity has increasingly become table stakes for not just new projects, but also retroactively existing ones. Many managed service providers (MSPs) are now being required by customers to layer additional cybersecurity services on top of both new equipment and a...

/ February 12, 2019
Https means you are safe, right?

Https means you are safe, right?

When it comes to website security, many believe that when you enter your private info, the only way to be reasonably assured that it really is the actual website — and not a spoof — is to look for https....

/ February 11, 2019 / 1 Comment
Ask an MSP Expert: How to create firewall policies for a company

Ask an MSP Expert: How to create firewall policies for a company

Q: With today’s evolving cyber threats, my IT service company is trying to offer our customers more proactive security measures beyond anti-malware and anti-spam filters. To really protect our customers, we want to offer a more sophisticated firewall solution. Once...

/ February 11, 2019
Tech Time Warp: The one with Anna Kournikova

Tech Time Warp: The one with Anna Kournikova

Think before you click. It’s a mantra that could have stopped so many email viruses in their tracks. After all, if it sounds too good to be true, it probably is — and that was the case with the Anna...

/ February 8, 2019
Is two-factor authentication enough? Not without education, experts say

Is two-factor authentication enough? Not without education, experts say

For what seems like a decade or more, two-factor authentication has been the gold standard of cybersecurity. We’re all used to it by now, and it’s one of the most used tools. You don’t build a robust defense without two-factor...

/ February 6, 2019
Three system weaknesses MSPs should be watching out for

Three system weaknesses MSPs should be watching out for

In the pre-internet age, a virus was something that required a tissue and aspirin, phishing meant you followed around a grunge band, and patching’s tech definition was limited to putting through a phone call. Fast-forward to today, where viruses spread...

/ January 30, 2019