Category: Security
Email is ripe for hacker exploitation
Hackers and scammers have learned over the years that the best way to get your employees’ attention is through a cleverly disguised email with a malware-infested link — sometimes asking for ransom. Regardless, it’s often employees who click these links...
The disconnect between cost of email security and effectiveness of internal IT
The single biggest challenge in selling a managed IT service has very little to do with the technology involved. Rather, it’s usually the pride of the internal IT organization that gets in the way of a more rational decision business...
Cities of all sizes are being targeted by ransomware attacks
Last year, it was Atlanta that was brought to its knees by a ransomware attack, sending the city reeling for weeks. This year, it was Baltimore’s turn. The ranks of municipal ransomware victims looks very different.
Cybersecurity Threat Advisory: Capital One Data Breach Disclosure
Overview: On Monday June 29, 2019, Capital One (a financial services company that handles credit cards for their own brand and many 3rd-Party brands) publicly disclosed a significant data breach exposing personally identifiable information for millions of their customers. The...
Cybersecurity Threat Advisory: Router Attack has Hijacked over 180,000 Brazilian routers
Advisory Overview Threat actors have been changing settings on home and small-business routers manufactured by D-Link in order to re-route users to malicious websites. The changes are made after a user loads a website that contains a “poisoned” advertisement –...
Malware resurges with an advertising disguise
Online advertisements can be irresistible. With a TV ad, you have to endure a 30-second spot pushing Corn Flakes or denture cream, whether you have any interest in those items or not. Online ads, however, are targeted to your interests....
Cybersecurity Threat Advisory: Lenovo-EMC Device Storage Leak Vulnerability
Advisory Overview Several different Lenovo-EMC Network Attached Storage (NAS) devices – including those from the Iomega NAS device line – have critical vulnerabilities that must be patched. These devices, if left unpatched, have the ability to allow a threat actor...
Halt! Who goes there? Helping clients manage passwords
The idea of passwords goes back long before computers, back to when you had to prove you were a friend by giving the secret word to get by the guard. Much later, it provided a way to prove you were...
Cybersecurity threats are no longer just a big company problem
The cybersecurity landscape has changed — what was once considered “just a large company” problem now affects companies of all sizes. While many small business owners continue to operate under the belief that security breaches only impact large businesses —...
MSPs can protect self-driving cars and their passengers
Autonomous vehicles are here to stay, and MSPs have a significant opportunity to become guardians of their security. Many MSPs already have industrial accounts, and that is where the most significant advances are occurring. A survey last year showed that...