Category: Security

Email threat types: Data exfiltration

Email threat types: Data exfiltration

Data exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices. The stolen data is transferred from the victim to a control server or some other device that is controlled...

/ October 19, 2020
The Creeper and the Reaper make cybersecurity history

The Creeper and the Reaper make cybersecurity history

“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

/ October 16, 2020
Ask an MSP Expert: Overcoming human error to secure the cloud

Ask an MSP Expert: Overcoming human error to secure the cloud

Data breaches in the cloud are becoming more common, impacting industry giants and small players alike, and MSPs now have to dig deeper to prevent them.

/ October 12, 2020
Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”

Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”

Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...

/ October 9, 2020
Cybersecurity trends to know in 2020

Cybersecurity trends to know in 2020

Cybersecurity is one of the major constants in our 21st century lives. However, did you know that one of the world’s first laws designed to fight malicious internet activity was passed in 1990? The United Kingdom’s Cybersecurity Misuse Act preempted...

/ October 6, 2020
Email threat types: Malware

Email threat types: Malware

Email attacks often come in the form of a harmless-looking email with malware attached as a .zip file or embedded in an email attachment. This malware could install ransomware, spyware, and other damaging programs. Malware is short for ‘malicious software’ and...

/ October 5, 2020
Tech Time Warp: National Cybersecurity Awareness Month turns 17

Tech Time Warp: National Cybersecurity Awareness Month turns 17

For the past 17 years, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) have used the month of October to educate Americans about the importance of good cybersecurity habits. Much has changed since the...

/ October 2, 2020
Zero-day attacks wreak havoc on notable targets

Zero-day attacks wreak havoc on notable targets

Some major brands have been rocked by zero-day attacks and vulnerability discoveries in recent weeks. A popular plug-in for WordPress is the subject of a zero-day vulnerability that may expose more than 700,000 sites to malicious exploit. The WordPress File...

/ October 1, 2020
Managing data sprawl

Managing data sprawl

As a managed service provider (MSP), data is one of the many things we are responsible for. However, the shift to remote working, followed by partial staff returns to the office, with the possibility of workforces heading back home again...

/ September 29, 2020
Cybersecurity best practices for back-to-school 2020

Cybersecurity best practices for back-to-school 2020

Hackers have been exploiting weaknesses in school networks as campuses reopen in varying degrees during the pandemic. Schools of all sizes, though, are finding out what a threat hackers can pose to the educational process. The superintendent of the Valparaiso...

/ September 24, 2020