Category: Security

IoT devices are the office version of baby monitors

IoT devices are the office version of baby monitors

As the Dad to a three and six-year-old, the days of baby monitors was not that long ago. I owned a baby monitor, but I rarely used it because it also unnerved me. Baby monitors have a well-documented and inherent...

/ October 9, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: American Express Breach by Ex-employee

Cybersecurity Threat Advisory: American Express Breach by Ex-employee

Advisory Overview American Express – a provider of credit, travel, and other business and personal finance services –advised some customers on September 30, 2019 that their personal and American Express account information may have been compromised and may be used...

/ October 8, 2019
Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Q: My MSP is located in an industrialized city and an increasing amount of our clients are manufacturing facilities. What can we do to keep our manufacturing clients safe? First of all, congratulations on posing the question — this means...

/ October 7, 2019
Tech Time Warp: Fernando Corbató, father of the computer password

Tech Time Warp: Fernando Corbató, father of the computer password

Each October, the U.S. Department of Homeland Security shares tips and tricks for tech safety during National Cybersecurity Awareness Month. Naturally, a key focus is using strong, secure passwords — tips the father of the computer password, Fernando Corbató, could...

/ October 4, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Comodo Security Breached by vBulletin Zero Day

Cybersecurity Threat Advisory: Comodo Security Breached by vBulletin Zero Day

Advisory Overview: Cybersecurity firm Comodo – who provides website security certificates and other services – recently suffered a breach of their web forum site which included usernames, IP addresses, and other data of forum users. Since many users re-use credentials...

/ October 3, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft Releases Patch for Internet Explorer Vulnerability

Cybersecurity Threat Advisory: Microsoft Releases Patch for Internet Explorer Vulnerability

Advisory Overview: Microsoft has released an emergency patch for Internet Explorer (multiple versions) that fixes a critical vulnerability in that browser. By manipulating Internet Explorer via a specially-configured website, a threat actor can gain privileges equal to the user who...

/ October 3, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: LastPass Bug Leaks Credentials From Previous Site

Cybersecurity Threat Advisory: LastPass Bug Leaks Credentials From Previous Site

Advisory Summary: LastPass is a very popular and widely used password manager – software designed to save user passwords, create secure passwords, and automatically fill in usernames and passwords on websites. Recently, security researchers have discovered that JavaScript embedded in...

/ October 3, 2019
MSP provides comprehensive network and email security

MSP provides comprehensive network and email security

NoctisIT has been serving the Austin, Texas area since 2013, providing technical help desk support, computer support, and consulting services to small and mid-size businesses. The service provider’s security expertise has contributed to its demand, not only in protecting highly...

/ October 3, 2019 / 1 Comment
What it really takes to become a Managed Security Services Provider (MSSP)

What it really takes to become a Managed Security Services Provider (MSSP)

If an IT solution provider wants to become a managed security services provider (MSSP), they will need the ability to remediate a cybersecurity breach in well under two hours, based on how long it currently takes the average IT organization...

/ October 3, 2019
The vulnerability of VPNs

The vulnerability of VPNs

Forget using the public WiFi at the airport or poaching the McDonald’s signal in the parking lot. You’ve installed a VPN for your client. Now when they travel out of the office for remote work, their data will be safe,...

/ October 2, 2019