Category: Security
Malware resurges with an advertising disguise
Online advertisements can be irresistible. With a TV ad, you have to endure a 30-second spot pushing Corn Flakes or denture cream, whether you have any interest in those items or not. Online ads, however, are targeted to your interests....
Cybersecurity Threat Advisory: Lenovo-EMC Device Storage Leak Vulnerability
Advisory Overview Several different Lenovo-EMC Network Attached Storage (NAS) devices – including those from the Iomega NAS device line – have critical vulnerabilities that must be patched. These devices, if left unpatched, have the ability to allow a threat actor...
Halt! Who goes there? Helping clients manage passwords
The idea of passwords goes back long before computers, back to when you had to prove you were a friend by giving the secret word to get by the guard. Much later, it provided a way to prove you were...
Cybersecurity threats are no longer just a big company problem
The cybersecurity landscape has changed — what was once considered “just a large company” problem now affects companies of all sizes. While many small business owners continue to operate under the belief that security breaches only impact large businesses —...
MSPs can protect self-driving cars and their passengers
Autonomous vehicles are here to stay, and MSPs have a significant opportunity to become guardians of their security. Many MSPs already have industrial accounts, and that is where the most significant advances are occurring. A survey last year showed that...
Keeping up with spear phishing criminals
Remember the days when everything you had to protect was safely housed behind a first-generation firewall, before the proliferation of the cloud and sophisticated cyber threats? We heard that long sigh and we understand. We miss the ’90s too. Advancements...
Ask an MSP Expert: How can our MSP implement a robust AI program?
Q: AI is growing in popularity. How can my 10-employee MSP best leverage AI in day-to-day business? Could directly investing in more AI save me from having to increase my number of staff? Don’t put away your human resources hat...
Cybersecurity Threat Advisory: Zoom Conferencing Software Vulnerability Disclosure
What is the threat As reported by security researcher Johnathan Leitschuh via his Medium account, current Zoom Conferencing client software versions on Macintosh systems have a known vulnerability that allows a malicious actor to force-join a user to a new...
MSPs are being used to breach their customers’ networks
Hackers will probe for whatever weak links they can find to breach an enterprise’s network. However, what if the weak link is you, the MSP? The scenario of an MSP as system’s victim instead of the protector is increasingly playing...
Number of data protection officers increases dramatically in wake of GDPR
It seems that a chief data protection officer is not only an official job responsibility, it’s a necessity. It’s estimated there are now more than half a million data protection officers in Europe alone, one year after the General Data...