Category: Security

Email is ripe for hacker exploitation

Email is ripe for hacker exploitation

Hackers and scammers have learned over the years that the best way to get your employees’ attention is through a cleverly disguised email with a malware-infested link — sometimes asking for ransom. Regardless, it’s often employees who click these links...

/ August 2, 2019
The disconnect between cost of email security and effectiveness of internal IT

The disconnect between cost of email security and effectiveness of internal IT

The single biggest challenge in selling a managed IT service has very little to do with the technology involved. Rather, it’s usually the pride of the internal IT organization that gets in the way of a more rational decision business...

/ August 1, 2019
Cities of all sizes are being targeted by ransomware attacks

Cities of all sizes are being targeted by ransomware attacks

Last year, it was Atlanta that was brought to its knees by a ransomware attack, sending the city reeling for weeks. This year, it was Baltimore’s turn. The ranks of municipal ransomware victims looks very different.

/ July 31, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Capital One Data Breach Disclosure

Cybersecurity Threat Advisory: Capital One Data Breach Disclosure

Overview: On Monday June 29, 2019, Capital One (a financial services company that handles credit cards for their own brand and many 3rd-Party brands) publicly disclosed a significant data breach exposing personally identifiable information for millions of their customers. The...

/ July 30, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Router Attack has Hijacked over 180,000 Brazilian routers

Cybersecurity Threat Advisory: Router Attack has Hijacked over 180,000 Brazilian routers

Advisory Overview Threat actors have been changing settings on home and small-business routers manufactured by D-Link in order to re-route users to malicious websites. The changes are made after a user loads a website that contains a “poisoned” advertisement –...

/ July 25, 2019
Malware resurges with an advertising disguise

Malware resurges with an advertising disguise

Online advertisements can be irresistible. With a TV ad, you have to endure a 30-second spot pushing Corn Flakes or denture cream, whether you have any interest in those items or not. Online ads, however, are targeted to your interests....

/ July 24, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Lenovo-EMC Device Storage Leak Vulnerability

Cybersecurity Threat Advisory: Lenovo-EMC Device Storage Leak Vulnerability

Advisory Overview Several different Lenovo-EMC Network Attached Storage (NAS) devices – including those from the Iomega NAS device line – have critical vulnerabilities that must be patched. These devices, if left unpatched, have the ability to allow a threat actor...

/ July 23, 2019
Halt! Who goes there? Helping clients manage passwords

Halt! Who goes there? Helping clients manage passwords

The idea of passwords goes back long before computers, back to when you had to prove you were a friend by giving the secret word to get by the guard. Much later, it provided a way to prove you were...

/ July 19, 2019
Cybersecurity threats are no longer just a big company problem

Cybersecurity threats are no longer just a big company problem

The cybersecurity landscape has changed — what was once considered “just a large company” problem now affects companies of all sizes. While many small business owners continue to operate under the belief that security breaches only impact large businesses —...

/ July 17, 2019
MSPs can protect self-driving cars and their passengers

MSPs can protect self-driving cars and their passengers

Autonomous vehicles are here to stay, and MSPs have a significant opportunity to become guardians of their security. Many MSPs already have industrial accounts, and that is where the most significant advances are occurring. A survey last year showed that...

/ July 17, 2019