Category: Security

Tech Time Warp: Microsoft chases a storm

Tech Time Warp: Microsoft chases a storm

In early 2007, network administrators began dealing with a trojan that grew into a massive botnet and even stumped Microsoft for more than a year. The Storm worm initially spread via email, promising the recipient news about dangerous storms in...

/ September 6, 2019
Document sharing chaos creates opportunity for MSPs

Document sharing chaos creates opportunity for MSPs

There’s no doubt that document sharing in the cloud has been a boon to productivity, but as it turns out, there can be too much of a good thing. A recent survey of 150 professionals working in enterprise organizations conducted...

/ September 5, 2019
Are IoT devices serious security threats?

Are IoT devices serious security threats?

IoT is transforming offices, campuses, and factories, but also brings warnings that the cloud-connected security camera monitoring the storage room could be a threat. How realistic are these warnings, and how much is hyperbole? For answers, Smarter MSP checked in...

/ September 4, 2019
Greater reliance on security metrics is driving increased spending on cybersecurity

Greater reliance on security metrics is driving increased spending on cybersecurity

Despite the increasing number of cyberattacks making headlines, convincing organizations to invest more in cybersecurity technologies remains a major challenge. Too many organizations are still relying on just a firewall and often anti-virus (AV) software that typically has not been...

/ September 3, 2019
Ask an MSP Expert: How do I make sure my Office 365 data is safe?

Ask an MSP Expert: How do I make sure my Office 365 data is safe?

Q: We have clients who run almost their entire business on Office 365. However, most of them decline additional security services because they think that “Microsoft has my back,” but how true is that? To answer this question, Smarter MSP...

/ September 3, 2019 / 1 Comment
When throttling is acceptable

When throttling is acceptable

I have previously written about how important it is to be flexible with customers, allowing the occasional traffic burst to go unnoticed – well, at least as far as the invoice is concerned. The problem is when that traffic burst...

/ September 2, 2019
Five off-the-radar security threats

Five off-the-radar security threats

Complacency is a formidable enemy. You have a robust patching regimen, an educational component to your MSP offerings, pen testing, and you segment data so that an attack on your client’s system can be contained and quarantined. It’s easy to...

/ August 28, 2019
Cybersecurity attacks aimed at MSPs are taking a toll

Cybersecurity attacks aimed at MSPs are taking a toll

For the better part of a year now, managed service providers (MSPs) have been the focal point of a series of attacks that are starting to erode customer confidence. A survey of 476 attendees at the recent Black Hat USA...

/ August 27, 2019 / 2 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Pulse Connect Secure VPN and FortiGate SSL VPN Vulnerability

Cybersecurity Threat Advisory: Pulse Connect Secure VPN and FortiGate SSL VPN Vulnerability

Advisory Overview: Researchers have discovered critical security flaws in FortiGate and Pulse Connect Virtual Private Network (VPN) systems. VPN’s are routinely used to secure online communication, such as between a remote worker’s desktop and the corporate network, and are very...

/ August 27, 2019
Tech Time Warp: SoBig.F worm creates some big problems

Tech Time Warp: SoBig.F worm creates some big problems

It’s amazing that the unwitting computer users of 2019 are still clicking on suspicious attachments considering the havoc such files have been wreaking for decades. Back in August 2003, the SoBig.F virus — the sixth variant of the SoBig worm...

/ August 23, 2019