Category: Security

The pros and cons of biometrics

The pros and cons of biometrics

A new malware targeting banking customers in Brazil calls into question the security of biometric account protections. Interestingly, the sophisticated attack – dubbed as CamuBot, uses very low-tech, retro ways to target its victims. CamuBot was recently described in ThreatPost...

/ October 3, 2018
Securing content in motion has become much easier

Securing content in motion has become much easier

For many years, content management vendors have been trying to protect content as it moved through the world by attaching a set of rules. The earliest attempt, before the cloud came along, was called Information Rights Management (IRM). It was a...

/ September 27, 2018
The dangers lurking in SMB networks

The dangers lurking in SMB networks

The most significant risks to your SMB customers don’t always come from threats with catchy names like Wanna Cry. Instead, the biggest threats can come from sources with names that are often more mundane like “Paula in Accounting” or “Dave...

/ September 26, 2018
Threat hunting could be very good for managed services providers

Threat hunting could be very good for managed services providers

In their zeal to be seen to be doing more about cybersecurity, vendors are increasingly embedding threat monitoring capabilities within a variety of applications to make it easier to hunt for malware. But even when vendors decide to make threat detection...

/ September 25, 2018
Single sign-on can simplify life for your employees

Single sign-on can simplify life for your employees

As you company collects cloud services, it can be a pain tracking logins. A good way to get around that problem is providing your users with a single sign-on. This is a delightful concept that gives your users a single...

/ September 21, 2018
Fileless attacks are lurking threats

Fileless attacks are lurking threats

You’ve installed all the latest antivirus programs and firewalls for your SMB clients, and their networks are safe and sound. When things are working well, a calm status quo makes everyone happy. Unfortunately, a placid surface doesn’t necessarily mean there’s...

/ September 18, 2018
Two-factor authentication can solve the worst password problems

Two-factor authentication can solve the worst password problems

Small to medium-sized businesses often struggle with identity management because they lack the resources of big companies to implement enterprise solutions, but something as simple as two-factor authentication can help keep your company secure. Two-factor authentication simply means that after...

/ September 14, 2018
Biggest cybersecurity challenge MSPs face today is pride and prejudice

Biggest cybersecurity challenge MSPs face today is pride and prejudice

A recent survey of 250 senior IT leaders suggests that when it comes to cybersecurity, organizations are reluctant to completely outsource the management of their security operations centers (SOCs). The State of SOAR Report 2018 survey was conducted by Virtual...

/ September 11, 2018
Tech Time Warp: ‘Here You Have’ Virus Spams the World

Tech Time Warp: ‘Here You Have’ Virus Spams the World

The ‘Here You Have’ virus—which kept IT departments busy in early September 2010—has all the makings of a good Jack Ryan outing. Major corporate and government disruption? Check. (Entities from Disney to NASA were affected.) A hacker claiming credit on...

/ September 7, 2018
Today’s hackers are definitely not your father’s hackers

Today’s hackers are definitely not your father’s hackers

There was once a hacker stereotype — the prototype was a pimply-faced teenage boy living in his parent’s basement in some nondescript suburb. His end goal was proving he could get into your network and show off his bonafides to...

/ September 4, 2018 / 2 Comments