Category: Security

Ask an MSP Expert: What is conversation hijacking and how can I protect against it?

Ask an MSP Expert: What is conversation hijacking and how can I protect against it?

Q: Lately we have heard a lot about emerging conversation hijacking threats. What does conversation hijacking entail and how can my MSP business prevent it from negatively affecting our customers? Hackers and other bad actors are always inventing new methods...

/ March 30, 2020 / 12 Comments
Threat Spotlight: Coronavirus-related phishing

Threat Spotlight: Coronavirus-related phishing

As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web. Barracuda researchers have seen a steady increase in...

/ March 26, 2020
MSP community starts to circle the cybersecurity wagons

MSP community starts to circle the cybersecurity wagons

It appears the managed services provider (MSP) community may finally be coming to the conclusion that it’s time to come to each other’s mutual aid, rather than hanging separately. CompTIA has announced it will be assuming the leadership of a...

/ March 25, 2020
Beyond phishing: Best practices for working from home

Beyond phishing: Best practices for working from home

Millions of workers worldwide are now finding themselves employed remotely. They are trying to keep the gears of earth’s economy turning, even as the COVID-19 causes many industries to halt. Working from home has created unfamiliar terrain for many people...

/ March 24, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Windows GDI+ RCE Vulnerability (CVE-2020-0881)

Cybersecurity Threat Advisory: Windows GDI+ RCE Vulnerability (CVE-2020-0881)

Advisory Overview Multiple versions of Windows are affected by a new RCE vulnerability. Supported operating systems like Widows 8, 10, Server 2012, and Server 2016 were issued a patch normally on March 10th, but Windows 7 and Server 2008 were...

/ March 23, 2020
Ask an MSP Expert: How can we protect data in a remote work environment?

Ask an MSP Expert: How can we protect data in a remote work environment?

Q: Most of our clients have sent their workers home to work remotely due to the COVID-19 epidemic. How can we keep our technicians and our client’s data safe? The spread of COVID-19 has wreaked havoc on businesses across the...

/ March 23, 2020
The best and worst of data protection times are upon MSPs

The best and worst of data protection times are upon MSPs

A survey of nearly 1,000 IT professionals published finds that when it comes to data protection, it is truly the best and worst of times. Conducted by The Ponemon Institute on behalf of Experian, a provider of IT services, the...

/ March 18, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Healthcare Facilities Targeted During COVID-19 Outbreak

Cybersecurity Threat Advisory: Healthcare Facilities Targeted During COVID-19 Outbreak

Advisory Overview One of the Czech Republic’s biggest hospitals has been hit with a cyber-attack amid COVID-19 testing. Healthcare facilities, especially hospitals are advised to be on high alert. SKOUT recommends all organizations to be extra cautious during this time...

/ March 17, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: COVID-19 Live Map Downloads Delivering Malware

Cybersecurity Threat Advisory: COVID-19 Live Map Downloads Delivering Malware

Threat Overview There has been an increase in cyber criminals weaponizing fears concerning the Coronavirus to deliver malware. Delivery of this malware is done largely through spam email campaigns where users receive emails with deceptive text and attached files (usually...

/ March 17, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: SMBGhost (CVE-2020-0796)

Cybersecurity Threat Advisory: SMBGhost (CVE-2020-0796)

Advisory Overview Microsoft has released a patch outside their regular cycle for Microsoft Windows 10 & Windows Server within SMB, a commonly utilized Windows protocol. The vulnerability allows a threat actor to execute code on the target server or client...

/ March 17, 2020