Category: Security

For goodness’ sake, get a web filter
This week, news emerged about a government agency being infected with malware because one of its employees apparently liked to watch porn on his work computer. This is a classic case of an organization not putting safeguards in place that...

Yahoo’s $50M damages bill demonstrates the high cost of poor security
Years ago there was a commercial for oil filters in which the spokesperson warned that you could pay him a few dollars for a filter or pay a mechanic later for an expensive repair. “Pay me now, or pay him...

Clive Longbottom: Helping customers avoid their biggest threat
In talking to customers, you probably find that their biggest concern is how they can protect themselves from external malicious activity. However, many times the biggest threat to their business is the behaviour of their own employees. The troubling behaviour...

The era of the cloud mafia?
As a third-generation Italian-American growing up in the Midwest, I was used to hearing about the feared Mafia, either in the stories of older relatives or in the misguided attempts at humor by school kids.

Tech Time Warp: The curious cases of early hackers
These days, cybersecurity is such a pervasive concern that it’s easy to forget law enforcement and the courts once had no idea what to do with hackers. Some of the earliest cases of hacking and computer fraud predate the federal...

Stop blaming your employees for your lousy security
Seems like every week we hear a story blaming employees for being lax about security. They have bad passwords or they fall for phishing scams. They do all kinds of things that compromise your company’s security position, but here’s the...

MSPs are good medicine for hospitals
Imagine a senior government official with a pacemaker and the chilling scenarios that could play out if a hacker could overcome this device’s defenses. It sounds like something ripped out of a movie script, but it’s slowly creeping closer to...

Google launches new authentication service for drop-in identity management
When it comes to identity management, you want to make it as simple as possible. Most small businesses don’t have the development resources to build a solution with solid identity capabilities built-in from scratch. If you can’t afford to build...

Tech Time Warp: Big-time data breaches and the cybersecurity sins that led to them
Cybersecurity often seems like a moving target. The bad guys have a seemingly endless supply of spammy servers, plus all the time and budget in the world, whereas those charged with protecting companies from cybercrime face normal business constraints in...

MSPs need to stay relevant in the age of the cloud
There are two inexorable facts about cybersecurity and email that managed service providers (MSPs) can’t ignore. The first is that for all intents and purposes, email has become a cloud service. There may be some organizations still running a Microsoft...