Category: Security

Tech Time Warp: Stration worm preys on users’ best intentions

Tech Time Warp: Stration worm preys on users’ best intentions

In September 2006, the tech world was focused on a reported Windows vulnerability related to the implementation of Vector Markup Language (VML). While programmers raced to fix the VML issue, spammers capitalized on the opportunity. Using the new bug in...

/ September 27, 2019
Are banks doing enough to combat cybercrime?

Are banks doing enough to combat cybercrime?

Last week we explored the security vulnerabilities posed by banks using legacy systems and how MSPs can play a mitigation role. This week, we explore the steps banks and their security teams should be taking today to prevent the next...

/ September 25, 2019
MSPs should start investing in the banking industry

MSPs should start investing in the banking industry

Financial firms have long been at the forefront of malware attacks. In fact, a report released this year shows that a full 25 percent of attacks are aimed at businesses in the finance industry. The reasons for “virtual bank robberies”...

/ September 18, 2019
Long road to achieving GDPR compliance still lies ahead

Long road to achieving GDPR compliance still lies ahead

A survey of 1,263 IT professionals conducted by the Ponemon Institute, on behalf of the law firm McDermott Will & Emery LLP, suggests that even some of the best laid plans to comply with the General Data Protection Rule (GDPR)...

/ September 17, 2019
Helping SMBs comply with GDPR and other privacy laws

Helping SMBs comply with GDPR and other privacy laws

As cybersecurity incidents continue to increase globally, governments are starting to step in to protect their citizen’s personally identifiable information (PII). GDPR went into effect in the EU last year and the California Consumer Privacy Act (CCPA), which is set to launch on...

/ September 16, 2019
MSPs can go to the dogs

MSPs can go to the dogs

Everyone knows about the importance of safeguarding health data, and the incredible connectivity that is transforming healthcare. Hospitals and doctors’ offices are now cyber hubs dispensing medical wearables, promoting telemedicine, and building connected clinics. However, in their rush to corner...

/ September 11, 2019
Tech Time Warp: Microsoft chases a storm

Tech Time Warp: Microsoft chases a storm

In early 2007, network administrators began dealing with a trojan that grew into a massive botnet and even stumped Microsoft for more than a year. The Storm worm initially spread via email, promising the recipient news about dangerous storms in...

/ September 6, 2019
Document sharing chaos creates opportunity for MSPs

Document sharing chaos creates opportunity for MSPs

There’s no doubt that document sharing in the cloud has been a boon to productivity, but as it turns out, there can be too much of a good thing. A recent survey of 150 professionals working in enterprise organizations conducted...

/ September 5, 2019
Are IoT devices serious security threats?

Are IoT devices serious security threats?

IoT is transforming offices, campuses, and factories, but also brings warnings that the cloud-connected security camera monitoring the storage room could be a threat. How realistic are these warnings, and how much is hyperbole? For answers, Smarter MSP checked in...

/ September 4, 2019
Greater reliance on security metrics is driving increased spending on cybersecurity

Greater reliance on security metrics is driving increased spending on cybersecurity

Despite the increasing number of cyberattacks making headlines, convincing organizations to invest more in cybersecurity technologies remains a major challenge. Too many organizations are still relying on just a firewall and often anti-virus (AV) software that typically has not been...

/ September 3, 2019