Category: Security
Fileless attacks are lurking threats
You’ve installed all the latest antivirus programs and firewalls for your SMB clients, and their networks are safe and sound. When things are working well, a calm status quo makes everyone happy. Unfortunately, a placid surface doesn’t necessarily mean there’s...
Two-factor authentication can solve the worst password problems
Small to medium-sized businesses often struggle with identity management because they lack the resources of big companies to implement enterprise solutions, but something as simple as two-factor authentication can help keep your company secure. Two-factor authentication simply means that after...
Biggest cybersecurity challenge MSPs face today is pride and prejudice
A recent survey of 250 senior IT leaders suggests that when it comes to cybersecurity, organizations are reluctant to completely outsource the management of their security operations centers (SOCs). The State of SOAR Report 2018 survey was conducted by Virtual...
Tech Time Warp: ‘Here You Have’ Virus Spams the World
The ‘Here You Have’ virus—which kept IT departments busy in early September 2010—has all the makings of a good Jack Ryan outing. Major corporate and government disruption? Check. (Entities from Disney to NASA were affected.) A hacker claiming credit on...
Today’s hackers are definitely not your father’s hackers
There was once a hacker stereotype — the prototype was a pimply-faced teenage boy living in his parent’s basement in some nondescript suburb. His end goal was proving he could get into your network and show off his bonafides to...
Email bombing is making a quick comeback
I have an old AOL email account that I haven’t opened in seven years — maybe even ten. Right now, it’s a swamp of spam. My AOL could be email bombed, and I wouldn’t know or care. “Email bombing,” despite...
When the vulnerabilities hit your CPU, you can only wait for patches
Just when you thought it was safe to open up your computer, word emerged this month of another Intel chip vulnerability called L1TF / Foreshadow or more commonly just Foreshadow. According to TechRepublic, it’s eerily similar to the Spectre/Meltdown issues discovered...
Foreshadow foreshadowing trouble ahead?
Foreshadow has joined Spectre and Meltdown on the list of Intel’s announced chip security vulnerabilities this year. Intel announced the vulnerability and released a well-produced video explaining the lapse and recommended fixes. While Intel’s response to Spectre and Meltdown earlier...
How MSPs can help conquer K-12 security challenges
The ubiquitous yellow school buses are starting to rumble down the roads. High school athletes can be seen out on practice fields. Work-from-home parents will soon have their days “free” again. And for MSPs that manage school networks, summer breaks...
Clive Longbottom: MSPs need to think beyond physical security
As an MSP, you probably spend a lot of time making sure that your platform is secure — using long, complex passwords and (hopefully) two-factor authentication wherever possible; specifically named superuser accounts, rather than general shared sysadmin ones; heuristic-based anti-malware...