Category: Security

How to take a security-centric approach with your RMM

How to take a security-centric approach with your RMM

Q: We recognize that cybersecurity needs to be a priority for our MSP. How can we use the tools we have — or similar tools — to recognize vulnerabilities and anomalies in our customers’ network?  Cybercriminals are very good at...

/ October 14, 2019
Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Your smartphone carries a huge amount of personal data — and National Cybersecurity Awareness Month is a good time to safeguard your mobile phone with best practices such as the use of strong passwords, keeping software up to date, being...

/ October 11, 2019
IoT devices are the office version of baby monitors

IoT devices are the office version of baby monitors

As the Dad to a three and six-year-old, the days of baby monitors was not that long ago. I owned a baby monitor, but I rarely used it because it also unnerved me. Baby monitors have a well-documented and inherent...

/ October 9, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: American Express Breach by Ex-employee

Cybersecurity Threat Advisory: American Express Breach by Ex-employee

Advisory Overview American Express – a provider of credit, travel, and other business and personal finance services –advised some customers on September 30, 2019 that their personal and American Express account information may have been compromised and may be used...

/ October 8, 2019
Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Q: My MSP is located in an industrialized city and an increasing amount of our clients are manufacturing facilities. What can we do to keep our manufacturing clients safe? First of all, congratulations on posing the question — this means...

/ October 7, 2019
Tech Time Warp: Fernando Corbató, father of the computer password

Tech Time Warp: Fernando Corbató, father of the computer password

Each October, the U.S. Department of Homeland Security shares tips and tricks for tech safety during National Cybersecurity Awareness Month. Naturally, a key focus is using strong, secure passwords — tips the father of the computer password, Fernando Corbató, could...

/ October 4, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Comodo Security Breached by vBulletin Zero Day

Cybersecurity Threat Advisory: Comodo Security Breached by vBulletin Zero Day

Advisory Overview: Cybersecurity firm Comodo – who provides website security certificates and other services – recently suffered a breach of their web forum site which included usernames, IP addresses, and other data of forum users. Since many users re-use credentials...

/ October 3, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft Releases Patch for Internet Explorer Vulnerability

Cybersecurity Threat Advisory: Microsoft Releases Patch for Internet Explorer Vulnerability

Advisory Overview: Microsoft has released an emergency patch for Internet Explorer (multiple versions) that fixes a critical vulnerability in that browser. By manipulating Internet Explorer via a specially-configured website, a threat actor can gain privileges equal to the user who...

/ October 3, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: LastPass Bug Leaks Credentials From Previous Site

Cybersecurity Threat Advisory: LastPass Bug Leaks Credentials From Previous Site

Advisory Summary: LastPass is a very popular and widely used password manager – software designed to save user passwords, create secure passwords, and automatically fill in usernames and passwords on websites. Recently, security researchers have discovered that JavaScript embedded in...

/ October 3, 2019
MSP provides comprehensive network and email security

MSP provides comprehensive network and email security

NoctisIT has been serving the Austin, Texas area since 2013, providing technical help desk support, computer support, and consulting services to small and mid-size businesses. The service provider’s security expertise has contributed to its demand, not only in protecting highly...

/ October 3, 2019 / 1 Comment