Category: Security

How MSPs should help clients protect sensitive data when employees are terminated
Even under the best of employer circumstances — trustworthy staff that a business hopes to hold onto forever — employee behavior remains the single greatest risk factor to data security. Without training and vigilance, even well-meaning employees can accidentally click...

Threat Spotlight: Advanced polymorphic malware
Imagine having a key that changes shape to fit any lock you might encounter. That’s pretty much what malware creators have at their disposal with advanced polymorphic malware, and it’s a real headache for MSPs tasked with stopping it or,...

Mounting cybersecurity pressures taking a toll on internal IT
The single biggest impediment to any organization deciding to embrace managed security services is often the pride of the internal IT organization. Many IT professionals view having to rely on external help as a sign of weakness. That can be...

VPNFilter malware highlights router vulnerabilities
MSPs are in a good position to weather one of the most recent security threats to rear its head —VPNFilter. But, the recent hack provides a good reminder to pay attention to an unglamorous, often overlooked part of the IT...

Lack of cybersecurity skills, fear of reputation damage drive more reliance on MSPs
Most organizations today are well aware of the potential risks associated with cyber security. But not all those risks are of equal weight. A global survey of 1,800 business decision-makers conducted by Vanson Bourne on behalf of NTT Security, a...

MSPs and the law: What you need to know
Security breaches at large retailers, banks, and Equifax have grabbed the lion’s share of headlines recently. Meanwhile, the idyllic image of a small-town Main Street attorney working out of a plate-glass window front office with a shingle hanging outside has...

Little MSP on the Prairie: Cyber threats lurk in the heartland
The Great Plains have romanced explorers and broken the hearts of homesteaders for generations. For the Conestoga wagons traversing the Oregon Trail, the Great Plains were a necessary misery to endure as they headed toward the riches of the west,...

ATM security threats: Jackpotting and beyond
It’s easy to forget ATMs have been around so long. When ATM machines began showing up in my Ohio hometown sometime in the late 1970s, my grandmother found the technology incomprehensible. “Isn’t it nice that the banks give you money?”...

Tech Time Warp: The First Ethical Hacker
These days, the concept of an ethical hacker is so commonplace the profession has its own Certified Ethical Hacker designation, bestowed and governed by the International Council of E-Commerce Consultants. The ethical hackers of the world put their genius to...

MSPs have to outsmart wily students
There was a time when a teacher using an overhead projector was considered high-tech, but now smartboards, student tablets, smartphones, laptops, and campus-wide networks have turned schools into hubs of connectivity that are often too much for an in-house staff...