Category: Security

Email threat types: Malware

Email threat types: Malware

Email attacks often come in the form of a harmless-looking email with malware attached as a .zip file or embedded in an email attachment. This malware could install ransomware, spyware, and other damaging programs. Malware is short for ‘malicious software’ and...

/ October 5, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Universal Health Services Infected with Ryuk Ransomware

Cybersecurity Threat Advisory: Universal Health Services Infected with Ryuk Ransomware

Advisory Overview Earlier this week, Universal Health Services (UHS) suffered a ransomware attack that took down data networks at multiple facilities across the United States, wherein systems were crippled, antivirus software was maliciously disabled, many patients had to be relocated,...

/ October 2, 2020
Tech Time Warp: National Cybersecurity Awareness Month turns 17

Tech Time Warp: National Cybersecurity Awareness Month turns 17

For the past 17 years, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) have used the month of October to educate Americans about the importance of good cybersecurity habits. Much has changed since the...

/ October 2, 2020
Zero-day attacks wreak havoc on notable targets

Zero-day attacks wreak havoc on notable targets

Some major brands have been rocked by zero-day attacks and vulnerability discoveries in recent weeks. A popular plug-in for WordPress is the subject of a zero-day vulnerability that may expose more than 700,000 sites to malicious exploit. The WordPress File...

/ October 1, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Increased Attack Activity of Trickbot Variant

Cybersecurity Threat Advisory: Increased Attack Activity of Trickbot Variant

Advisory Overview The SKOUT Security Operations Center has recently observed an uptick in attack activity involving an emerging Trickbot variant known as Bazar Backdoor. Trickbot is a banking trojan and information stealer that has evolved over the years to fill...

/ September 30, 2020
Managing data sprawl

Managing data sprawl

As a managed service provider (MSP), data is one of the many things we are responsible for. However, the shift to remote working, followed by partial staff returns to the office, with the possibility of workforces heading back home again...

/ September 29, 2020
Cybersecurity best practices for back-to-school 2020

Cybersecurity best practices for back-to-school 2020

Hackers have been exploiting weaknesses in school networks as campuses reopen in varying degrees during the pandemic. Schools of all sizes, though, are finding out what a threat hackers can pose to the educational process. The superintendent of the Valparaiso...

/ September 24, 2020
Ask an MSP Expert: Should I outsource my cybersecurity?

Ask an MSP Expert: Should I outsource my cybersecurity?

Q: Our MSP is known for its robust and affordable cybersecurity. I’ve heard, however, that MSPs should outsource their own cybersecurity. What are your thoughts? MSPs have recently suffered a spate of cybersecurity glitches that have cast a spotlight on...

/ September 21, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zerologon Attack Targeting Windows Servers

Cybersecurity Threat Advisory: Zerologon Attack Targeting Windows Servers

Advisory Overview A critical vulnerability has been discovered which affects potentially all Windows domain controllers and can allow an unauthenticated attacker on the network to take control of an Active Directory domain controller at will. This can allow the attacker...

/ September 17, 2020
Hackers join the back to school rush

Hackers join the back to school rush

Around the world, workers are dealing with the new reality of having their offices at home. But professionals aren’t the only ones needing to adapt to being at home for the long haul; students are too. And MSPs and IT...

/ September 17, 2020