Category: Security

Finding the right security balance isn’t easy

Finding the right security balance isn’t easy

These days, MSPs would be foolish not to help their clients make their digital properties more secure. It seems that every week that we hear about yet another massive data breach with the loss of millions of records, often full...

/ March 25, 2019
Your local restaurant might be an IoT hotspot

Your local restaurant might be an IoT hotspot

What telecommuter hasn’t used McDonalds or Starbucks as an office away from the office? I know I’ve spent plenty of hours under those famous golden arches while on the road. The unsecured guest Wi-Fi flows as smoothly as the coffee,...

/ March 20, 2019
Ask an MSP Expert: What is a BEC attack and how do I explain it to my customers?

Ask an MSP Expert: What is a BEC attack and how do I explain it to my customers?

Q: We’ve heard that BEC attacks are one of the most prominent cybersecurity threats to our customers’ businesses today. What is this and how can we protect our SMBs from its attempts to breach our defenses? Business Email Compromise (BEC)...

/ March 18, 2019
The rise of malspam

The rise of malspam

If you are like me, you are probably finding it hard to believe that the first quarter of 2019 is almost over. It seems like a good time to stop and take a breath and look at what some of this...

/ March 13, 2019 / 1 Comment
Privilege access management emerges as next big cybersecurity opportunity for MSPs

Privilege access management emerges as next big cybersecurity opportunity for MSPs

Privilege access management (PAM) as of late has become a major area of cybersecurity focus because cybercriminals have become more adept at targeting attacks at specific individuals within organizations. The goal of these attacks is to compromise the credentials of...

/ March 12, 2019
Patching won’t solve all your security problems

Patching won’t solve all your security problems

I feel like I’m constantly receiving emails warning me about a program’s security vulnerability, saying how I need to download a patch. With all these alerts, I often grow exasperated about the number of security patches that I’m supposed to apply...

/ March 7, 2019
A holistic approach to cybersecurity is needed

A holistic approach to cybersecurity is needed

I recently wrote a security column about sandboxing and, to my tech eye, the technology seems to solve many issues. Sandboxing teases out a potential malware threat before it even becomes a problem. Plus, it’s scalable. There is off-the-shelf sandbox...

/ February 27, 2019
Have businesses learned their lesson from the Target breach?

Have businesses learned their lesson from the Target breach?

This month marks five years since Target announced the data breach that exposed 70 million customers’ credit card numbers and banking information.

/ February 20, 2019
MSPs need to deliver better employee training due to the rise of spear phishing

MSPs need to deliver better employee training due to the rise of spear phishing

For businesses and the MSPs that serve them, achieving effective IT security requires a strategy with several layers of defense. To thwart potential breaches, most organizations understand that – at a minimum – endpoint access should be tightly controlled, data...

/ February 18, 2019 / 1 Comment
Ask an MSP Expert: Is 24/7 monitoring necessary for MSPs?

Ask an MSP Expert: Is 24/7 monitoring necessary for MSPs?

Q: I’m the President of a small MSP in Wisconsin and I’m proud of our customer-service and problem-solving skills. However, my last tech goes home for the night at 11 p.m. and if a customer’s servers crash after that point,...

/ February 18, 2019 / 1 Comment