Category: Security

Helping SMBs find the balance between low and high-tech cybersecurity strategies

Helping SMBs find the balance between low and high-tech cybersecurity strategies

Cybersecurity is among the top priorities for companies concerned with growing threats. Yet, many SMBs are not making cybersecurity a top priority. In fact, 43 percent of cyberattacks are targeted at SMBs, but only 14 percent are prepared for an...

/ October 24, 2019
MSPs and schools can be a good cybersecurity partnership

MSPs and schools can be a good cybersecurity partnership

Achievement tests, rumbling school buses, and Friday night football are a few signs that the educational ecosystem is up and running again for another academic year. Schools are increasingly on the radar of hackers, who view schools as repositories of...

/ October 23, 2019
New tools could help users be more security savvy

New tools could help users be more security savvy

When it comes to security, your end users are often a weak link in your safety regimen. It’s not because they are malicious or careless. It’s because they often don’t know any better, making them vulnerable to social engineering and...

/ October 21, 2019
AI meets vishing

AI meets vishing

Artificial intelligence is making its presence felt in everything from Amazon’s Alexa to factory floor industrial applications. AI-infused software is ramping up its predictive capabilities and strengthening its algorithmic methodology to become more accurate. Of course, AI can be abused....

/ October 17, 2019 / 1 Comment
Ask an MSP Expert: How to take a security-centric approach with your RMM

Ask an MSP Expert: How to take a security-centric approach with your RMM

Q: We recognize that cybersecurity needs to be a priority for our MSP. How can we use the tools we have — or similar tools — to recognize vulnerabilities and anomalies in our customers’ network?  Cybercriminals are very good at...

/ October 14, 2019
Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Tech Time Warp: Royalty and celebrities swept up in UK phone hacking scandal

Your smartphone carries a huge amount of personal data — and National Cybersecurity Awareness Month is a good time to safeguard your mobile phone with best practices such as the use of strong passwords, keeping software up to date, being...

/ October 11, 2019
IoT devices are the office version of baby monitors

IoT devices are the office version of baby monitors

As the Dad to a three and six-year-old, the days of baby monitors was not that long ago. I owned a baby monitor, but I rarely used it because it also unnerved me. Baby monitors have a well-documented and inherent...

/ October 9, 2019
Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Ask an MSP Expert: How can my MSP provide security for manufacturing clients?

Q: My MSP is located in an industrialized city and an increasing amount of our clients are manufacturing facilities. What can we do to keep our manufacturing clients safe? First of all, congratulations on posing the question — this means...

/ October 7, 2019
Tech Time Warp: Fernando Corbató, father of the computer password

Tech Time Warp: Fernando Corbató, father of the computer password

Each October, the U.S. Department of Homeland Security shares tips and tricks for tech safety during National Cybersecurity Awareness Month. Naturally, a key focus is using strong, secure passwords — tips the father of the computer password, Fernando Corbató, could...

/ October 4, 2019
What it really takes to become a Managed Security Services Provider (MSSP)

What it really takes to become a Managed Security Services Provider (MSSP)

If an IT solution provider wants to become a managed security services provider (MSSP), they will need the ability to remediate a cybersecurity breach in well under two hours, based on how long it currently takes the average IT organization...

/ October 3, 2019