Category: Security

disgruntled employee
How MSPs should help clients protect sensitive data when employees are terminated

How MSPs should help clients protect sensitive data when employees are terminated

Even under the best of employer circumstances — trustworthy staff that a business hopes to hold onto forever — employee behavior remains the single greatest risk factor to data security. Without training and vigilance, even well-meaning employees can accidentally click...

/ June 13, 2018
polymorphic malware
Threat Spotlight: Advanced polymorphic malware

Threat Spotlight: Advanced polymorphic malware

Imagine having a key that changes shape to fit any lock you might encounter. That’s pretty much what malware creators have at their disposal with advanced polymorphic malware, and it’s a real headache for MSPs tasked with stopping it or,...

/ June 13, 2018 / 2 Comments
cybersecurity pressures
Mounting cybersecurity pressures taking a toll on internal IT

Mounting cybersecurity pressures taking a toll on internal IT

The single biggest impediment to any organization deciding to embrace managed security services is often the pride of the internal IT organization. Many IT professionals view having to rely on external help as a sign of weakness. That can be...

/ June 7, 2018
VPNFilter
VPNFilter malware highlights router vulnerabilities

VPNFilter malware highlights router vulnerabilities

MSPs are in a good position to weather one of the most recent security threats to rear its head —VPNFilter. But, the recent hack provides a good reminder to pay attention to an unglamorous, often overlooked part of the IT...

/ June 6, 2018
cybersecurity skills
Lack of cybersecurity skills, fear of reputation damage drive more reliance on MSPs

Lack of cybersecurity skills, fear of reputation damage drive more reliance on MSPs

Most organizations today are well aware of the potential risks associated with cyber security. But not all those risks are of equal weight. A global survey of 1,800 business decision-makers conducted by Vanson Bourne on behalf of NTT Security, a...

/ June 5, 2018
MSPs and the law
MSPs and the law: What you need to know

MSPs and the law: What you need to know

Security breaches at large retailers, banks, and Equifax have grabbed the lion’s share of headlines recently. Meanwhile, the idyllic image of a small-town Main Street attorney working out of a plate-glass window front office with a shingle hanging outside has...

/ May 29, 2018
cyber threats on the prairie
Little MSP on the Prairie: Cyber threats lurk in the heartland

Little MSP on the Prairie: Cyber threats lurk in the heartland

The Great Plains have romanced explorers and broken the hearts of homesteaders for generations. For the Conestoga wagons traversing the Oregon Trail, the Great Plains were a necessary misery to endure as they headed toward the riches of the west,...

/ May 23, 2018
ATM security
ATM security threats: Jackpotting and beyond

ATM security threats: Jackpotting and beyond

It’s easy to forget ATMs have been around so long. When ATM machines began showing up in my Ohio hometown sometime in the late 1970s, my grandmother found the technology incomprehensible. “Isn’t it nice that the banks give you money?”...

/ May 15, 2018
Hollerith tabulator
Tech Time Warp: The First Ethical Hacker

Tech Time Warp: The First Ethical Hacker

These days, the concept of an ethical hacker is so commonplace the profession has its own Certified Ethical Hacker designation, bestowed and governed by the International Council of E-Commerce Consultants. The ethical hackers of the world put their genius to...

/ May 11, 2018
school IT security
MSPs have to outsmart wily students

MSPs have to outsmart wily students

There was a time when a teacher using an overhead projector was considered high-tech, but now smartboards, student tablets, smartphones, laptops, and campus-wide networks have turned schools into hubs of connectivity that are often too much for an in-house staff...

/ May 9, 2018