Category: Security
Three system weaknesses MSPs should be watching out for
In the pre-internet age, a virus was something that required a tissue and aspirin, phishing meant you followed around a grunge band, and patching’s tech definition was limited to putting through a phone call. Fast-forward to today, where viruses spread...
The case for micro-segmentation
A recent report by BCC Research shows that the MSP market in the United States will grow from $62.0 billion in 2017 to $94.5 billion in 2021. While banking, insurance, and financial industries continue to dominate an MSP’s clientele, the...
Are chatbots the next major cyber security threat?
Me: “Where can I find a course catalogue online?” SmooSmoo: “Yep, I believe I know this one. 😉 I’ve found there’s an answer for your question, but it is not a public article. You need to login first to reveal the...
Malicious memes?
We’ve all seen them and laughed at them. There’s “Grumpy Cat” or “Be Like Bill.” In some cases, these memes have racked up over a billion views. That’s almost 20 percent of the world’s population who have been “dancing like the...
6 areas for MSPs to watch in 2019
2019. We have a year to get comfortable with those four digits, and it’s a good thing because they will bring quite a few changes to the growing IoT ecosystem and a few security challenges. We know you’re busy unwrapping...
When it comes to security, you’re never done
It’s safe to say that 2018 wasn’t a great year for security. Even the biggest companies in the world struggled to defend themselves against the constant onslaught of hacking attempts.
Can malware physically damage a computer?
The idea that a computer virus could damage hardware is something that has plagued the cyber community. Some of the more sensational stories out there suggest that it’s possible to send a bomb via email. I stumbled upon this article,...
Ask an MSP Expert: How can MSPs strengthen their clients’ defenses from cryptominers?
Q: I have some customers with fairly large networks, and one of them is a business college. It seems like all those latent CPUs would be an attractive target for cryptominers. We’ve been taking steps to protect them, but I’m...
Cybersecurity Threat Advisory: Zip Slip Critical Flaw Hits Thousands of Open-Source Projects
What is the Issue? Security firm Snyk has disclosed a widespread and critical flaw in multiple archive file-extraction libraries found in thousands of open-source web application projects from HP, Amazon, Apache, Oracle, LinkedIn, Twitter and others. Zip Slip is a...
Cybersecurity Threat Advisory: DHS Releases “Joanap” and “Brambul” Malware Indicators
What is the Issue: On Tuesday May 29, the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) released a comprehensive report on malware associated with North Korean Government cyber activity. The report details a remote access tool...