Category: Security

Top 5 things we learned during National Cyber Security Awareness Month

Top 5 things we learned during National Cyber Security Awareness Month

National Cyber Security Awareness Month has been busy here at Intronis. We hosted two webinars on cyber security and produced an e-book, a quiz, and multiple blog posts to help MSPs talk to their customers about cyber security. Now, as...

/ October 29, 2015
twitter for SEO
10 Twitter accounts MSPs need to follow to keep up on cyber security

10 Twitter accounts MSPs need to follow to keep up on cyber security

When it comes to cyber security, things change quickly. New threats emerge every day, and you need to stay current on the latest security news to make sure your customers are properly protected. In the age of social media, Twitter...

/ October 28, 2015
cyber security
The 3 worst data breaches of all time (and what we learned from them)

The 3 worst data breaches of all time (and what we learned from them)

On the occasion of October’s Cyber Security Awareness Month, we revisit three of the largest data breaches ever to make the headlines. Data breaches happen. The more the data under your management, the greater the price you’ll pay in lost...

/ October 19, 2015
cyber security
Cyber Security Awareness Month – 31 Tips for IT Service Providers

Cyber Security Awareness Month – 31 Tips for IT Service Providers

Since 2004, the National Cyber Security Division of the Department of Homeland Security and the non-profit National Cyber Security Alliance have sponsored National Cyber Security Awareness month every October as a way to encourage individuals and businesses alike to be...

/ October 1, 2015
security vulnerability
Venom security vulnerability threatens data centers, virtual machines

Venom security vulnerability threatens data centers, virtual machines

Security Researchers At CrowdStrike have uncovered a vulnerability that makes it possible for an attacker to escape from a virtual machine and gain access to the host hypervisor and the other virtual machines running on it. And that could mean...

/ May 15, 2015
Rombertik: What you need to know about malware’s suicide bomber

Rombertik: What you need to know about malware’s suicide bomber

Researchers at Cisco Systems’ Talos Group have identified a new variety of malware that, if detected, attempts to take its host computer with it. Known as Rombertik, it is unique in terms of the lengths it will go to avoid...

/ May 5, 2015
What SMB business continuity and disaster recovery plans are missing

What SMB business continuity and disaster recovery plans are missing

When we talk about business continuity and disaster recovery, data backup is always an important part of any suggested plan. And it’s true: if your SMB clients aren’t backing up their data, they’ll have big problems if they have a...

/ February 25, 2015
Malware
Ask an MSP Expert: How to explain malware to my customers

Ask an MSP Expert: How to explain malware to my customers

Q: I’m having trouble explaining malware to my customers. Can you define malware in terms they can understand? Also, what tips can I give them to help protect their business from a malware attack? You’re not alone. Every MSP faces...

/ January 25, 2015
Oh no they didn’t. Security password mistakes to avoid.

Oh no they didn’t. Security password mistakes to avoid.

If you haven’t already checked out the list of “Worst Passwords” released by SplashData earlier this week, you may want to—and soon. Each year, the company publishes a list of the riskiest passwords, which frighteningly, are also the most common. In an...

/ January 23, 2015