Category: Security
Keeping up with spear phishing criminals
Remember the days when everything you had to protect was safely housed behind a first-generation firewall, before the proliferation of the cloud and sophisticated cyber threats? We heard that long sigh and we understand. We miss the ’90s too. Advancements...
Ask an MSP Expert: How can our MSP implement a robust AI program?
Q: AI is growing in popularity. How can my 10-employee MSP best leverage AI in day-to-day business? Could directly investing in more AI save me from having to increase my number of staff? Don’t put away your human resources hat...
Cybersecurity Threat Advisory: Zoom Conferencing Software Vulnerability Disclosure
What is the threat As reported by security researcher Johnathan Leitschuh via his Medium account, current Zoom Conferencing client software versions on Macintosh systems have a known vulnerability that allows a malicious actor to force-join a user to a new...
MSPs are being used to breach their customers’ networks
Hackers will probe for whatever weak links they can find to breach an enterprise’s network. However, what if the weak link is you, the MSP? The scenario of an MSP as system’s victim instead of the protector is increasingly playing...
Number of data protection officers increases dramatically in wake of GDPR
It seems that a chief data protection officer is not only an official job responsibility, it’s a necessity. It’s estimated there are now more than half a million data protection officers in Europe alone, one year after the General Data...
Cybersecurity Threat Advisory: Threat Actors Have Obtained Cellular Network Customer Data
What is the threat? A long-term, focused theft of call detail records from hacked cell network providers has been uncovered by a group of cybersecurity researchers. Threat actors stole massive amounts of call detail records including – but not limited...
Cybersecurity Threat Advisory: Microsoft Excel Power Query Vulnerability
What is the threat? A feature in Microsoft Excel called Power Query is vulnerable to attack by threat actors leveraging the way this feature accesses data outside the spreadsheet that it resides in. Power Query is a legitimate feature; which...
Silex is disabling IoT devices as IoT’s growth becomes a security challenge
Recently, MSPs have been getting urgent calls from clients reporting that wireless printers, security cameras, and remote sensors are not working. Others skipped the calls to their MSPs and just bought new devices, thinking there had been a hardware failure. The...
The state of security does not feel terribly secure
It was yet another week of bad security news. We heard about hackers who had been breaking into cell phone networks and stealing call records for years. Then, we heard about vulnerabilities in the Global Entry System. It hasn’t resulted...
The summer security risk your customers are vulnerable to
Summer is here, and with it, an influx of new hires that include many recent graduates, seasonal employees, and summer interns. It’s an exciting time for all parties. However, it’s important to remember that the largest cybersecurity risk that small...