Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Supplemental Advisory for the BlueKeep Vulnerability

Cybersecurity Threat Advisory: Supplemental Advisory for the BlueKeep Vulnerability

Advisory Overview: Microsoft recently undertook efforts to protect Windows desktops and servers against a threat known as BlueKeep, a vulnerability in Remote Desktop Protocol – a tool used to remotely access a Windows desktop or server. During these efforts, Microsoft...

/ August 14, 2019
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019 / 1 Comment
Survey shines light on chronic need for actionable cybersecurity intelligence

Survey shines light on chronic need for actionable cybersecurity intelligence

A survey of 577 IT and IT security practitioners in the U.S. conducted by The Ponemon Institute on behalf of AttackIQ, a provider of security testing tools, suggests there’s a major opportunity for managed service providers (MSPs) to provide security...

/ August 13, 2019
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019 / 1 Comment
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: A New ‘Arbitrary File Copy’ Vulnerability Affects ProFTPD

Cybersecurity Threat Advisory: A New ‘Arbitrary File Copy’ Vulnerability Affects ProFTPD

Advisory Overview A popular and widely used server software package called ProFTPd has been found to have a vulnerability. This software runs on many different types of servers, including Windows, UNIX, and Linux; and provides File Transfer Protocol (FTP) services....

/ August 8, 2019
Increased connectivity leads to increased security needs

Increased connectivity leads to increased security needs

When it comes to IoT, there’s no limit to the thoughts from experts and security professionals about strategies for adapting to the rapidly changing connectivity landscape in the average office. This landscape is changing daily. One statement we can make with...

/ August 7, 2019
Fallout from high profile breaches will have major impact on IT service providers

Fallout from high profile breaches will have major impact on IT service providers

A recent series of high-profile data breaches is likely to have a profound impact on IT service providers for years to come.

/ August 6, 2019
Email is ripe for hacker exploitation

Email is ripe for hacker exploitation

Hackers and scammers have learned over the years that the best way to get your employees’ attention is through a cleverly disguised email with a malware-infested link — sometimes asking for ransom. Regardless, it’s often employees who click these links...

/ August 2, 2019
The disconnect between cost of email security and effectiveness of internal IT

The disconnect between cost of email security and effectiveness of internal IT

The single biggest challenge in selling a managed IT service has very little to do with the technology involved. Rather, it’s usually the pride of the internal IT organization that gets in the way of a more rational decision business...

/ August 1, 2019
Cities of all sizes are being targeted by ransomware attacks

Cities of all sizes are being targeted by ransomware attacks

Last year, it was Atlanta that was brought to its knees by a ransomware attack, sending the city reeling for weeks. This year, it was Baltimore’s turn. The ranks of municipal ransomware victims looks very different.

/ July 31, 2019