Category: Security

Malware resurges with an advertising disguise

Malware resurges with an advertising disguise

Online advertisements can be irresistible. With a TV ad, you have to endure a 30-second spot pushing Corn Flakes or denture cream, whether you have any interest in those items or not. Online ads, however, are targeted to your interests....

/ July 24, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Lenovo-EMC Device Storage Leak Vulnerability

Cybersecurity Threat Advisory: Lenovo-EMC Device Storage Leak Vulnerability

Advisory Overview Several different Lenovo-EMC Network Attached Storage (NAS) devices – including those from the Iomega NAS device line – have critical vulnerabilities that must be patched. These devices, if left unpatched, have the ability to allow a threat actor...

/ July 23, 2019
Halt! Who goes there? Helping clients manage passwords

Halt! Who goes there? Helping clients manage passwords

The idea of passwords goes back long before computers, back to when you had to prove you were a friend by giving the secret word to get by the guard. Much later, it provided a way to prove you were...

/ July 19, 2019
Cybersecurity threats are no longer just a big company problem

Cybersecurity threats are no longer just a big company problem

The cybersecurity landscape has changed — what was once considered “just a large company” problem now affects companies of all sizes. While many small business owners continue to operate under the belief that security breaches only impact large businesses —...

/ July 17, 2019
MSPs can protect self-driving cars and their passengers

MSPs can protect self-driving cars and their passengers

Autonomous vehicles are here to stay, and MSPs have a significant opportunity to become guardians of their security. Many MSPs already have industrial accounts, and that is where the most significant advances are occurring. A survey last year showed that...

/ July 17, 2019
Keeping up with spear phishing criminals

Keeping up with spear phishing criminals

Remember the days when everything you had to protect was safely housed behind a first-generation firewall, before the proliferation of the cloud and sophisticated cyber threats? We heard that long sigh and we understand. We miss the ’90s too. Advancements...

/ July 16, 2019
Ask an MSP Expert: How can our MSP implement a robust AI program?

Ask an MSP Expert: How can our MSP implement a robust AI program?

Q: AI is growing in popularity. How can my 10-employee MSP best leverage AI in day-to-day business? Could directly investing in more AI save me from having to increase my number of staff?  Don’t put away your human resources hat...

/ July 15, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zoom Conferencing Software Vulnerability Disclosure

Cybersecurity Threat Advisory: Zoom Conferencing Software Vulnerability Disclosure

What is the threat As reported by security researcher Johnathan Leitschuh via his Medium account, current Zoom Conferencing client software versions on Macintosh systems have a known vulnerability that allows a malicious actor to force-join a user to a new...

/ July 10, 2019
MSPs are being used to breach their customers’ networks

MSPs are being used to breach their customers’ networks

Hackers will probe for whatever weak links they can find to breach an enterprise’s network. However, what if the weak link is you, the MSP? The scenario of an MSP as system’s victim instead of the protector is increasingly playing...

/ July 10, 2019
Number of data protection officers increases dramatically in wake of GDPR

Number of data protection officers increases dramatically in wake of GDPR

It seems that a chief data protection officer is not only an official job responsibility, it’s a necessity. It’s estimated there are now more than half a million data protection officers in Europe alone, one year after the General Data...

/ July 4, 2019