Category: Security

Patching won’t solve all your security problems

Patching won’t solve all your security problems

I feel like I’m constantly receiving emails warning me about a program’s security vulnerability, saying how I need to download a patch. With all these alerts, I often grow exasperated about the number of security patches that I’m supposed to apply...

/ March 7, 2019
A holistic approach to cybersecurity is needed

A holistic approach to cybersecurity is needed

I recently wrote a security column about sandboxing and, to my tech eye, the technology seems to solve many issues. Sandboxing teases out a potential malware threat before it even becomes a problem. Plus, it’s scalable. There is off-the-shelf sandbox...

/ February 27, 2019
Have businesses learned their lesson from the Target breach?

Have businesses learned their lesson from the Target breach?

This month marks five years since Target announced the data breach that exposed 70 million customers’ credit card numbers and banking information.

/ February 20, 2019
MSPs need to deliver better employee training due to the rise of spear phishing

MSPs need to deliver better employee training due to the rise of spear phishing

For businesses and the MSPs that serve them, achieving effective IT security requires a strategy with several layers of defense. To thwart potential breaches, most organizations understand that – at a minimum – endpoint access should be tightly controlled, data...

/ February 18, 2019 / 1 Comment
Ask an MSP Expert: Is 24/7 monitoring necessary for MSPs?

Ask an MSP Expert: Is 24/7 monitoring necessary for MSPs?

Q: I’m the President of a small MSP in Wisconsin and I’m proud of our customer-service and problem-solving skills. However, my last tech goes home for the night at 11 p.m. and if a customer’s servers crash after that point,...

/ February 18, 2019 / 1 Comment
Can sandboxing protect your client’s business?

Can sandboxing protect your client’s business?

When one thinks of a sandbox, what comes to mind are idyllic images of kids playing with buckets, shovels, and miniature-bulldozers on a pleasant summer day. A solid sandbox is a way to contain the kids to a safe area,...

/ February 13, 2019
Coming to terms with offering managed security services

Coming to terms with offering managed security services

Cybersecurity has increasingly become table stakes for not just new projects, but also retroactively existing ones. Many managed service providers (MSPs) are now being required by customers to layer additional cybersecurity services on top of both new equipment and a...

/ February 12, 2019
Https means you are safe, right?

Https means you are safe, right?

When it comes to website security, many believe that when you enter your private info, the only way to be reasonably assured that it really is the actual website — and not a spoof — is to look for https....

/ February 11, 2019 / 1 Comment
Tech Time Warp: The one with Anna Kournikova

Tech Time Warp: The one with Anna Kournikova

Think before you click. It’s a mantra that could have stopped so many email viruses in their tracks. After all, if it sounds too good to be true, it probably is — and that was the case with the Anna...

/ February 8, 2019
Is two-factor authentication enough? Not without education, experts say

Is two-factor authentication enough? Not without education, experts say

For what seems like a decade or more, two-factor authentication has been the gold standard of cybersecurity. We’re all used to it by now, and it’s one of the most used tools. You don’t build a robust defense without two-factor...

/ February 6, 2019