Category: Security

New tools could help users be more security savvy

New tools could help users be more security savvy

When it comes to security, your end users are often a weak link in your safety regimen. It’s not because they are malicious or careless. It’s because they often don’t know any better, making them vulnerable to social engineering and...

/ October 21, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: D-Link Routers Unauthenticated Vulnerability

Cybersecurity Threat Advisory: D-Link Routers Unauthenticated Vulnerability

Advisory Overview Several older D-Link routers have a known vulnerability that can allow an attacker to use a legitimate communications channel in illegitimate ways. Through this vulnerability, and attacker could send program code or files that can allow the attacker...

/ October 17, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New Microsoft NTLM Flaws May Allow Full Domain Compromise

Cybersecurity Threat Advisory: New Microsoft NTLM Flaws May Allow Full Domain Compromise

Advisory Overview NTLM is one of several methods that can be used to authenticate and confirm the identity of a user within a Windows-based network. Two flaws in NTLM were recently found which could allow an attacker to trick NTLM...

/ October 17, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: TransUnion Incident: Credit Info Exposed

Cybersecurity Threat Advisory: TransUnion Incident: Credit Info Exposed

Advisory Overview: TransUnion, a credit reporting bureau, recently began notifying some consumers that their credit information had been obtained by an unauthorized person or persons. The access occurred when a threat actor illegally accessed a TransUnion website that allows businesses...

/ October 17, 2019
AI meets vishing

AI meets vishing

Artificial intelligence is making its presence felt in everything from Amazon’s Alexa to factory floor industrial applications. AI-infused software is ramping up its predictive capabilities and strengthening its algorithmic methodology to become more accurate. Of course, AI can be abused....

/ October 17, 2019 / 1 Comment
How to take a security-centric approach with your RMM

How to take a security-centric approach with your RMM

Q: We recognize that cybersecurity needs to be a priority for our MSP. How can we use the tools we have — or similar tools — to recognize vulnerabilities and anomalies in our customers’ network?  Cybercriminals are very good at...

/ October 14, 2019
Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Your smartphone carries a huge amount of personal data — and National Cybersecurity Awareness Month is a good time to safeguard your mobile phone with best practices such as the use of strong passwords, keeping software up to date, being...

/ October 11, 2019
IoT devices are the office version of baby monitors

IoT devices are the office version of baby monitors

As the Dad to a three and six-year-old, the days of baby monitors was not that long ago. I owned a baby monitor, but I rarely used it because it also unnerved me. Baby monitors have a well-documented and inherent...

/ October 9, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: American Express Breach by Ex-employee

Cybersecurity Threat Advisory: American Express Breach by Ex-employee

Advisory Overview American Express – a provider of credit, travel, and other business and personal finance services –advised some customers on September 30, 2019 that their personal and American Express account information may have been compromised and may be used...

/ October 8, 2019
Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Q: My MSP is located in an industrialized city and an increasing amount of our clients are manufacturing facilities. What can we do to keep our manufacturing clients safe? First of all, congratulations on posing the question — this means...

/ October 7, 2019