Category: Security

Three system weaknesses MSPs should be watching out for

Three system weaknesses MSPs should be watching out for

In the pre-internet age, a virus was something that required a tissue and aspirin, phishing meant you followed around a grunge band, and patching’s tech definition was limited to putting through a phone call. Fast-forward to today, where viruses spread...

/ January 30, 2019
The case for micro-segmentation

The case for micro-segmentation

A recent report by BCC Research shows that the MSP market in the United States will grow from $62.0 billion in 2017 to $94.5 billion in 2021. While banking, insurance, and financial industries continue to dominate an MSP’s clientele, the...

/ January 23, 2019
Are chatbots the next major cyber security threat?

Are chatbots the next major cyber security threat?

Me: “Where can I find a course catalogue online?” SmooSmoo: “Yep, I believe I know this one. 😉 I’ve found there’s an answer for your question, but it is not a public article. You need to login first to reveal the...

/ January 16, 2019
Malicious memes?

Malicious memes?

We’ve all seen them and laughed at them. There’s “Grumpy Cat” or “Be Like Bill.”  In some cases, these memes have racked up over a billion views. That’s almost 20 percent of the world’s population who have been “dancing like the...

/ January 9, 2019 / 1 Comment
6 areas for MSPs to watch in 2019

6 areas for MSPs to watch in 2019

2019. We have a year to get comfortable with those four digits, and it’s a good thing because they will bring quite a few changes to the growing IoT ecosystem and a few security challenges. We know you’re busy unwrapping...

/ January 1, 2019
When it comes to security, you’re never done

When it comes to security, you’re never done

It’s safe to say that 2018 wasn’t a great year for security. Even the biggest companies in the world struggled to defend themselves against the constant onslaught of hacking attempts.

/ December 26, 2018
Can malware physically damage a computer?

Can malware physically damage a computer?

The idea that a computer virus could damage hardware is something that has plagued the cyber community. Some of the more sensational stories out there suggest that it’s possible to send a bomb via email. I stumbled upon this article,...

/ December 19, 2018 / 2 Comments
Ask an MSP Expert: How can MSPs strengthen their clients’ defenses from cryptominers?

Ask an MSP Expert: How can MSPs strengthen their clients’ defenses from cryptominers?

Q: I have some customers with fairly large networks, and one of them is a business college. It seems like all those latent CPUs would be an attractive target for cryptominers. We’ve been taking steps to protect them, but I’m...

/ December 17, 2018
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zip Slip Critical Flaw Hits Thousands of Open-Source Projects

Cybersecurity Threat Advisory: Zip Slip Critical Flaw Hits Thousands of Open-Source Projects

What is the Issue? Security firm Snyk has disclosed a widespread and critical flaw in multiple archive file-extraction libraries found in thousands of open-source web application projects from HP, Amazon, Apache, Oracle, LinkedIn, Twitter and others. Zip Slip is a...

/ December 11, 2018
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: DHS Releases “Joanap” and “Brambul” Malware Indicators

Cybersecurity Threat Advisory: DHS Releases “Joanap” and “Brambul” Malware Indicators

What is the Issue: On Tuesday May 29, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a comprehensive report on malware associated with North Korean Government cyber activity. The report details a remote access tool...

/ December 11, 2018