Category: Security

Cybersecurity attacks aimed at MSPs are taking a toll
For the better part of a year now, managed service providers (MSPs) have been the focal point of a series of attacks that are starting to erode customer confidence. A survey of 476 attendees at the recent Black Hat USA...

Cybersecurity Threat Advisory: Pulse Connect Secure VPN and FortiGate SSL VPN Vulnerability
Advisory Overview: Researchers have discovered critical security flaws in FortiGate and Pulse Connect Virtual Private Network (VPN) systems. VPN’s are routinely used to secure online communication, such as between a remote worker’s desktop and the corporate network, and are very...

Tech Time Warp: SoBig.F worm creates some big problems
It’s amazing that the unwitting computer users of 2019 are still clicking on suspicious attachments considering the havoc such files have been wreaking for decades. Back in August 2003, the SoBig.F virus — the sixth variant of the SoBig worm...

Partner Spotlight: How one MSP outsmarts cybercriminals
Portland-based Elevate Technology Group was founded in 2010 to insert and maintain IT solutions that help businesses protect and reach their long-term goals. Elevate Technology Group specifically offers managed IT services and 24/7/365 remote support, among other solutions and services....

A low-tech standby for cybersecurity
With all the cybersecurity tools in the arsenal of the average MSP, there’s one that often gets understandably overlooked: paper and marker. Yes, patching, anti-virus protection, double authentication, and firewalls are the most crucial elements of your cybersecurity regime, but...

Targeted ransomware attacks creates new opportunities and challenges
Every successful high-profile ransomware attack that winds up gaining a lot of mainstream media coverage is generally good for managed service providers (MSPs) that specialize in helping organizations recover from such attacks. In the last few days, coverage of ransomware...

Cybersecurity Threat Advisory: Supplemental Advisory for the BlueKeep Vulnerability
Advisory Overview: Microsoft recently undertook efforts to protect Windows desktops and servers against a threat known as BlueKeep, a vulnerability in Remote Desktop Protocol – a tool used to remotely access a Windows desktop or server. During these efforts, Microsoft...

Supply chain attacks on the rise
You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

Survey shines light on chronic need for actionable cybersecurity intelligence
A survey of 577 IT and IT security practitioners in the U.S. conducted by The Ponemon Institute on behalf of AttackIQ, a provider of security testing tools, suggests there’s a major opportunity for managed service providers (MSPs) to provide security...

Your next hack could arrive by snail mail
When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...