Category: Security
Drive success by demonstrating the value of email security
Founded in 2008 and headquartered in Indianapolis, Indiana, KSM Consulting’s services offerings include management consulting, IT consulting, cybersecurity, data analytics, and project management for businesses and non-profits of all sizes and industries, as well as government agencies. Mark Creighton, technology...
Cybersecurity Threat Advisory: Windows Zero-Day Privilege Escalation Exploit
Advisory Overview Kaspersky has detected a Windows 0-day vulnerability which attackers are using in conjunction with a Google Chrome exploit to take control of unpatched systems. Last month Google patched Chrome for an exploit which allows attackers to hack visitors...
Ask an MSP Expert: How do I persuade my client to invest more in cybersecurity?
Q: I have a client with a complex network, but they spend almost nothing on cybersecurity. How do I persuade them that allocating some of their operating budget for cybersecurity expenses is worthwhile? That’s a good question and the answer...
Cybersecurity Threat Advisory: Security Measures for the Holiday Season
Advisory Overview During the upcoming holiday season, SKOUT wants to ensure that our customers stay safe while traveling and are extra vigilant online. With holiday sale campaigns and donations to charities in full swing, the time is perfect for spam...
Cybersecurity preparations for the holiday season
‘Twas the night before Christmas, and all through the network, not a creature, was stirring, not even a virus. When out on the server, there arose such a clatter, the technician sprang to their portal to see what was the...
Tech Time Warp: Teens left their fingerprints on the Goner worm
Much like the “Wet Bandits” left their signature (running water in a stopped-up sink) on home burglaries in the holiday classic Home Alone, the Israeli teenagers arrested in December 2001 for spreading the Goner worm signed their work — and...
Cybersecurity Threat Advisory: Email Bombing
Advisory Overview Threat actors have recently increased attempts to take email servers offline by overloading the servers with thousands of email messages (known as “email bombing”). This attack is similar to a Denial of Service (DOS) attack, where hundreds of...
The growth of IoMT and what it means for MSPs
We know that IoT is transforming the landscape for MSPs. MSPs that once simply had to monitor and maintain a bare-bones network, now must contend with everything from connected coffeemakers to myriad BYOD items. There is a sub-variant of IoT that’s...
Tech Time Warp: Columbia researchers find IoT vulnerability
The headlines were inflammatory in every sense of the word: In November 2011, two Columbia University researchers recognized a security vulnerability in HP printers and set one ablaze. Professors Salvatore Stolfo and Ang Cui realized that every time an HP...
Cities have a massive need for cybersecurity
Cities are increasingly making headlines for being crippled by ransomware and other attacks. Such vulnerability isn’t surprising, since municipalities have a growing number of attack vectors and a pool of taxpayer or insurance money that hackers find too tempting to resist....
