Category: Security

Cybersecurity Threat Advisory: Supplemental Advisory for the BlueKeep Vulnerability
Advisory Overview: Microsoft recently undertook efforts to protect Windows desktops and servers against a threat known as BlueKeep, a vulnerability in Remote Desktop Protocol – a tool used to remotely access a Windows desktop or server. During these efforts, Microsoft...

Supply chain attacks on the rise
You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

Survey shines light on chronic need for actionable cybersecurity intelligence
A survey of 577 IT and IT security practitioners in the U.S. conducted by The Ponemon Institute on behalf of AttackIQ, a provider of security testing tools, suggests there’s a major opportunity for managed service providers (MSPs) to provide security...

Your next hack could arrive by snail mail
When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

Cybersecurity Threat Advisory: A New ‘Arbitrary File Copy’ Vulnerability Affects ProFTPD
Advisory Overview A popular and widely used server software package called ProFTPd has been found to have a vulnerability. This software runs on many different types of servers, including Windows, UNIX, and Linux; and provides File Transfer Protocol (FTP) services....

Increased connectivity leads to increased security needs
When it comes to IoT, there’s no limit to the thoughts from experts and security professionals about strategies for adapting to the rapidly changing connectivity landscape in the average office. This landscape is changing daily. One statement we can make with...

Fallout from high profile breaches will have major impact on IT service providers
A recent series of high-profile data breaches is likely to have a profound impact on IT service providers for years to come.

Email is ripe for hacker exploitation
Hackers and scammers have learned over the years that the best way to get your employees’ attention is through a cleverly disguised email with a malware-infested link — sometimes asking for ransom. Regardless, it’s often employees who click these links...

The disconnect between cost of email security and effectiveness of internal IT
The single biggest challenge in selling a managed IT service has very little to do with the technology involved. Rather, it’s usually the pride of the internal IT organization that gets in the way of a more rational decision business...

Cities of all sizes are being targeted by ransomware attacks
Last year, it was Atlanta that was brought to its knees by a ransomware attack, sending the city reeling for weeks. This year, it was Baltimore’s turn. The ranks of municipal ransomware victims looks very different.