Category: Security

MSPs need to deliver better employee training due to the rise of spear phishing

MSPs need to deliver better employee training due to the rise of spear phishing

For businesses and the MSPs that serve them, achieving effective IT security requires a strategy with several layers of defense. To thwart potential breaches, most organizations understand that – at a minimum – endpoint access should be tightly controlled, data...

/ February 18, 2019 / 1 Comment
Ask an MSP Expert: Is 24/7 monitoring necessary for MSPs?

Ask an MSP Expert: Is 24/7 monitoring necessary for MSPs?

Q: I’m the President of a small MSP in Wisconsin and I’m proud of our customer-service and problem-solving skills. However, my last tech goes home for the night at 11 p.m. and if a customer’s servers crash after that point,...

/ February 18, 2019 / 1 Comment
Can sandboxing protect your client’s business?

Can sandboxing protect your client’s business?

When one thinks of a sandbox, what comes to mind are idyllic images of kids playing with buckets, shovels, and miniature-bulldozers on a pleasant summer day. A solid sandbox is a way to contain the kids to a safe area,...

/ February 13, 2019
Coming to terms with offering managed security services

Coming to terms with offering managed security services

Cybersecurity has increasingly become table stakes for not just new projects, but also retroactively existing ones. Many managed service providers (MSPs) are now being required by customers to layer additional cybersecurity services on top of both new equipment and a...

/ February 12, 2019
Https means you are safe, right?

Https means you are safe, right?

When it comes to website security, many believe that when you enter your private info, the only way to be reasonably assured that it really is the actual website — and not a spoof — is to look for https....

/ February 11, 2019 / 1 Comment
Tech Time Warp: The one with Anna Kournikova

Tech Time Warp: The one with Anna Kournikova

Think before you click. It’s a mantra that could have stopped so many email viruses in their tracks. After all, if it sounds too good to be true, it probably is — and that was the case with the Anna...

/ February 8, 2019
Is two-factor authentication enough? Not without education, experts say

Is two-factor authentication enough? Not without education, experts say

For what seems like a decade or more, two-factor authentication has been the gold standard of cybersecurity. We’re all used to it by now, and it’s one of the most used tools. You don’t build a robust defense without two-factor...

/ February 6, 2019
Three system weaknesses MSPs should be watching out for

Three system weaknesses MSPs should be watching out for

In the pre-internet age, a virus was something that required a tissue and aspirin, phishing meant you followed around a grunge band, and patching’s tech definition was limited to putting through a phone call. Fast-forward to today, where viruses spread...

/ January 30, 2019
The case for micro-segmentation

The case for micro-segmentation

A recent report by BCC Research shows that the MSP market in the United States will grow from $62.0 billion in 2017 to $94.5 billion in 2021. While banking, insurance, and financial industries continue to dominate an MSP’s clientele, the...

/ January 23, 2019
Are chatbots the next major cyber security threat?

Are chatbots the next major cyber security threat?

Me: “Where can I find a course catalogue online?” SmooSmoo: “Yep, I believe I know this one. 😉 I’ve found there’s an answer for your question, but it is not a public article. You need to login first to reveal the...

/ January 16, 2019