Category: Security

Threat Watch: NotPetya ransomware

Threat Watch: NotPetya ransomware

Update: As researchers learn more about the malware that quickly spread around the world earlier this week, it has become clear the malware wasn’t what it first appeared to be. According to Forbes, multiple security researchers have uncovered flaws in...

/ June 27, 2017
internet
Navigating conversations with customers about WannaCry ransomware

Navigating conversations with customers about WannaCry ransomware

By now, you’ve probably heard all the buzz around the most recent ransomware attack called WannaCry. So far, a reported 150 countries have been affected, and according to BBC news, the fast-spreading ransomware is finally starting to slow down. While...

/ May 18, 2017
email
Email, the primary vector for cyber attacks

Email, the primary vector for cyber attacks

In in the wake of last week’s attacks, new facts are still surfacing about WannaCry ransomware. The ransomware leverages a known vulnerability called EternalBlue that is widespread in older Windows operating systems and was patched in a security update Microsoft...

/ May 17, 2017
wannacry ransomware
WannaCry ransomware should eventually blow some good for MSPs

WannaCry ransomware should eventually blow some good for MSPs

While the fallout from the WannaCry ransomware attack will reach into the billions of dollars, the one positive outcome should be a wave of upgrades for millions of older Windows PCs that unfortunately are still widely deployed. The malware employed...

/ May 16, 2017
cyber security
Threat Watch: WannaCry Ransomware

Threat Watch: WannaCry Ransomware

It’s no secret that cyber threats are becoming more widespread and sophisticated day-by-day. But, according to an article on CNN today, cyber security experts were stunned worldwide by the outbreak of WannaCry, a ransomware that infects Windows computers and locks...

/ May 12, 2017
uk cybersecurity
UK study shines spotlight on scope of IT security challenge

UK study shines spotlight on scope of IT security challenge

Despite the increased awareness concerning IT security threats, a new survey from the United Kingdom suggests far too many organizations still don’t have anything approaching a formal IT security strategy. Three-fifths (57 percent) of the respondents to a survey conducted...

/ April 20, 2017
workstation
Ask an MSP Expert: How can I minimize downtime from breach to detection?

Ask an MSP Expert: How can I minimize downtime from breach to detection?

Q: For my MSP, preventing and minimizing downtime for our customers is crucial—especially when we’re protecting data for businesses in highly regulated industries. What are a few improvements we can make that can really help us minimize the downtime from...

/ April 17, 2017
phone
Vulnerabilities beyond phishing: Why SMBs need to be cautious

Vulnerabilities beyond phishing: Why SMBs need to be cautious

Did you know that the average worker gets 121 emails a day? With so many emails pouring into inboxes, it’s no wonder that phishing attacks are successful. Not only are workers tirelessly keeping up with answering their emails, but the...

/ April 5, 2017
privacy policy
The MSP’s Bookshelf: The Art of Intrusion

The MSP’s Bookshelf: The Art of Intrusion

Security can be a challenge. One unprotected port, one unchanged default password, or even one improperly configured item can leave businesses open to vulnerabilities and breaches. With so much to safeguard, it can be easy to miss the one small...

/ March 29, 2017
password management
The woes of password management

The woes of password management

If you’re like anybody who uses computers today, you’re dealing with passwords. I alone have more than 58 just for the websites I use on a regular basis. That doesn’t include any hardware passwords,  Wi-Fi passwords, computer logins, or clients’...

/ March 20, 2017