Category: Security

ransomware
MSPs need to be on the frontline of any ransomware defense

MSPs need to be on the frontline of any ransomware defense

While there is still much unknown about the latest wave of Petya/GoldenEye ransomware attacks, it’s all too clear that organizations that don’t keep pace with the latest patches are being targeted faster than ever. It used to take cybercriminals a...

/ June 29, 2017
Threat Watch: NotPetya ransomware

Threat Watch: NotPetya ransomware

Update: As researchers learn more about the malware that quickly spread around the world earlier this week, it has become clear the malware wasn’t what it first appeared to be. According to Forbes, multiple security researchers have uncovered flaws in...

/ June 27, 2017
Tech Time Warp: The First Case of Ransomware

Tech Time Warp: The First Case of Ransomware

The WannaCry ransomware attack once again brings the need for backup and security solutions into focus, but ransomware is nothing new. The first case of ransomware, chock-full of “truth is stranger than fiction” details, occurred in 1989. The PC Cyborg...

/ May 19, 2017
wannacry ransomware
WannaCry ransomware should eventually blow some good for MSPs

WannaCry ransomware should eventually blow some good for MSPs

While the fallout from the WannaCry ransomware attack will reach into the billions of dollars, the one positive outcome should be a wave of upgrades for millions of older Windows PCs that unfortunately are still widely deployed. The malware employed...

/ May 16, 2017
uk cybersecurity
UK study shines spotlight on scope of IT security challenge

UK study shines spotlight on scope of IT security challenge

Despite the increased awareness concerning IT security threats, a new survey from the United Kingdom suggests far too many organizations still don’t have anything approaching a formal IT security strategy. Three-fifths (57 percent) of the respondents to a survey conducted...

/ April 20, 2017
Cyber Security
What is a phlashing attack?

What is a phlashing attack?

Throughout the past year, our inboxes and RSS feeds have been flooded with news about malware and ransomware. But what about phlashing attacks? Phlashing attacks have been designed by hackers with one sole purpose: to infect and permanently damage —...

/ April 11, 2017
password management
The woes of password management

The woes of password management

If you’re like anybody who uses computers today, you’re dealing with passwords. I alone have more than 58 just for the websites I use on a regular basis. That doesn’t include any hardware passwords,  Wi-Fi passwords, computer logins, or clients’...

/ March 20, 2017
data management regulations
GDPR Promises to Forever Change How Data Gets Managed

GDPR Promises to Forever Change How Data Gets Managed

Given the rise of both Donald Trump and Theresa May, there’s never been more focus on regulations in recent memory. But the regulation that is starting to loom largest in the minds of business executives emanates from Brussels rather than...

/ March 14, 2017

Threat Watch: Resume Files containing Advanced Persistent Threats

As cybercriminals become more duplicitous by the day, businesses and individuals alike need to be more aware than ever of their digital surroundings. One example of this was recently highlighted on the Barracuda blog: Resume files containing Advanced Persistent Threats...

/ March 14, 2017
it security fatigue
Growing IT security fatigue bodes well for MSSPs

Growing IT security fatigue bodes well for MSSPs

The size of the opportunity for managed security service providers (MSSPs) has always been constrained by one dominant factor. Far too many IT organizations believe they can adequately defend their organizations despite all evidence to the contrary. But, a new report...

/ February 14, 2017