Category: Security

Rethinking personally identifiable information in 2021
In a year full of data breaches, ransomware, and phishing, now is a good time to put things into perspective and perhaps rethink data security for the coming year. The fact is, all cybersecurity is created equal, and not all...

Five steps to building a managed security services offering
The turn of the new decade has been eventful. The global pandemic, the shift to a remote workforce, and the ever-growing number of cyberthreats and cyberattacks has made cybersecurity top of mind for businesses of all sizes. Our Evolving Landscape...

Cybersecurity laws: What MSPs need to do
Cybersecurity isn’t just about firewalls and patching. Cybersecurity is also about education and legislation — often, these two go hand in hand. The legislative landscape is continuously evolving as more rules and regulations attempt to add guardrails and protections to...

Tech Time Warp: Conficker, the Botnet that became too hot to handle
Conficker is a piece of malware we just can’t seem to quit. Despite first being identified in November 2008, some estimate that as of September 2020 there were still 150,000 Conficker detections a month, mostly in vastly populated Brazil and...

BEC attacks on the rise
In a year dominated by COVID, elections, and ransomware, there are plenty of cybersecurity experts looking to other emerging threats as we begin to wind down the year. “I think the biggest cybersecurity threat facing businesses today are user account...

Domains impersonating news sites emerge as cybersecurity threat
SmarterMSP has highlighted the recent danger of malware and ransomware coming into email boxes tied to news of the day. An example might be an email appeal for funds related to post-election legal action or rebuilding after California’s wildfires. Other...

The cloud-breaching headlines keep piling up
The cloud has been victim to several high-profile breaches in recent weeks. The latest involves Pharmaceutical giant Pfizer, which suffered a significant breach of unsecured cloud data. According to Security Boulevard: The exposed data, including email addresses, home addresses, full...

Seven key ways to defend a network from fatal DDoS attacks
Distributed Denial of Service Attacks (DDoS) are much different than what they used to be. In the past, DDoS attacks involved sending as much traffic and data as possible to a network or server, with the idea of overwhelming it...

Ask an MSP Expert: MSPs and November elections
No matter what happens on Election Day in the USA, it will ripple through the MSP ecosystem. All significant events tend to bring out the cybercriminals, and 2020 has been a bonanza for the bad guys. According to a Forbes...

Email threat types: Domain Impersonation
Domain impersonation, also known as typosquatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate domains, such as Barracudamsp.com, by creating domains that appear similar. Such a domain might be accessed by a user typing the...