Category: Security

AI meets vishing

AI meets vishing

Artificial intelligence is making its presence felt in everything from Amazon’s Alexa to factory floor industrial applications. AI-infused software is ramping up its predictive capabilities and strengthening its algorithmic methodology to become more accurate. Of course, AI can be abused....

/ October 17, 2019
Ask an MSP Expert: How to take a security-centric approach with your RMM

Ask an MSP Expert: How to take a security-centric approach with your RMM

Q: We recognize that cybersecurity needs to be a priority for our MSP. How can we use the tools we have — or similar tools — to recognize vulnerabilities and anomalies in our customers’ network?  Cybercriminals are very good at...

/ October 14, 2019
Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Your smartphone carries a huge amount of personal data — and National Cybersecurity Awareness Month is a good time to safeguard your mobile phone with best practices such as the use of strong passwords, keeping software up to date, being...

/ October 11, 2019
IoT devices are the office version of baby monitors

IoT devices are the office version of baby monitors

As the Dad to a three and six-year-old, the days of baby monitors was not that long ago. I owned a baby monitor, but I rarely used it because it also unnerved me. Baby monitors have a well-documented and inherent...

/ October 9, 2019
Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Q: My MSP is located in an industrialized city and an increasing amount of our clients are manufacturing facilities. What can we do to keep our manufacturing clients safe? First of all, congratulations on posing the question — this means...

/ October 7, 2019
Tech Time Warp: Fernando Corbató, father of the computer password

Tech Time Warp: Fernando Corbató, father of the computer password

Each October, the U.S. Department of Homeland Security shares tips and tricks for tech safety during National Cybersecurity Awareness Month. Naturally, a key focus is using strong, secure passwords — tips the father of the computer password, Fernando Corbató, could...

/ October 4, 2019
What it really takes to become a Managed Security Services Provider (MSSP)

What it really takes to become a Managed Security Services Provider (MSSP)

If an IT solution provider wants to become a managed security services provider (MSSP), they will need the ability to remediate a cybersecurity breach in well under two hours, based on how long it currently takes the average IT organization...

/ October 3, 2019
The vulnerability of VPNs

The vulnerability of VPNs

Forget using the public WiFi at the airport or poaching the McDonald’s signal in the parking lot. You’ve installed a VPN for your client. Now when they travel out of the office for remote work, their data will be safe,...

/ October 2, 2019
phishing
Ask an MSP Expert: What do my customers need to know about phishing?

Ask an MSP Expert: What do my customers need to know about phishing?

Q: It seems like every day I hear about a new security threat. With phishing scams on the rise, I want to educate my SMBs on how to avoid it. Most of my customers have only the most basic knowledge...

/ September 30, 2019
Tech Time Warp: Stration worm preys on users’ best intentions

Tech Time Warp: Stration worm preys on users’ best intentions

In September 2006, the tech world was focused on a reported Windows vulnerability related to the implementation of Vector Markup Language (VML). While programmers raced to fix the VML issue, spammers capitalized on the opportunity. Using the new bug in...

/ September 27, 2019