Category: Security

The pros and cons of biometrics
A new malware targeting banking customers in Brazil calls into question the security of biometric account protections. Interestingly, the sophisticated attack – dubbed as CamuBot, uses very low-tech, retro ways to target its victims. CamuBot was recently described in ThreatPost...

Securing content in motion has become much easier
For many years, content management vendors have been trying to protect content as it moved through the world by attaching a set of rules. The earliest attempt, before the cloud came along, was called Information Rights Management (IRM). It was a...

The dangers lurking in SMB networks
The most significant risks to your SMB customers don’t always come from threats with catchy names like Wanna Cry. Instead, the biggest threats can come from sources with names that are often more mundane like “Paula in Accounting” or “Dave...

Threat hunting could be very good for managed services providers
In their zeal to be seen to be doing more about cybersecurity, vendors are increasingly embedding threat monitoring capabilities within a variety of applications to make it easier to hunt for malware. But even when vendors decide to make threat detection...

Single sign-on can simplify life for your employees
As you company collects cloud services, it can be a pain tracking logins. A good way to get around that problem is providing your users with a single sign-on. This is a delightful concept that gives your users a single...

Fileless attacks are lurking threats
You’ve installed all the latest antivirus programs and firewalls for your SMB clients, and their networks are safe and sound. When things are working well, a calm status quo makes everyone happy. Unfortunately, a placid surface doesn’t necessarily mean there’s...

Two-factor authentication can solve the worst password problems
Small to medium-sized businesses often struggle with identity management because they lack the resources of big companies to implement enterprise solutions, but something as simple as two-factor authentication can help keep your company secure. Two-factor authentication simply means that after...

Biggest cybersecurity challenge MSPs face today is pride and prejudice
A recent survey of 250 senior IT leaders suggests that when it comes to cybersecurity, organizations are reluctant to completely outsource the management of their security operations centers (SOCs). The State of SOAR Report 2018 survey was conducted by Virtual...

Tech Time Warp: ‘Here You Have’ Virus Spams the World
The ‘Here You Have’ virus—which kept IT departments busy in early September 2010—has all the makings of a good Jack Ryan outing. Major corporate and government disruption? Check. (Entities from Disney to NASA were affected.) A hacker claiming credit on...

Today’s hackers are definitely not your father’s hackers
There was once a hacker stereotype — the prototype was a pimply-faced teenage boy living in his parent’s basement in some nondescript suburb. His end goal was proving he could get into your network and show off his bonafides to...