Category: Security

Biometric conversations for MSPs

Biometric conversations for MSPs

Passwords are a cornerstone of the various security deployments that MSPs put in place for their customers. Password technology, however, has changed little since the dawn of the modern computer age. How long before the password is replaced with something...

/ October 10, 2018
Managing identity between machines remains a challenge

Managing identity between machines remains a challenge

As we move into a time of machines conducting business on our behalf, we need to start thinking about the implications of that in terms of security and identity. If your machine is talking to my machine, we suddenly have...

/ October 5, 2018
The pros and cons of biometrics

The pros and cons of biometrics

A new malware targeting banking customers in Brazil calls into question the security of biometric account protections. Interestingly, the sophisticated attack – dubbed as CamuBot, uses very low-tech, retro ways to target its victims. CamuBot was recently described in ThreatPost...

/ October 3, 2018
Securing content in motion has become much easier

Securing content in motion has become much easier

For many years, content management vendors have been trying to protect content as it moved through the world by attaching a set of rules. The earliest attempt, before the cloud came along, was called Information Rights Management (IRM). It was a...

/ September 27, 2018
The dangers lurking in SMB networks

The dangers lurking in SMB networks

The most significant risks to your SMB customers don’t always come from threats with catchy names like Wanna Cry. Instead, the biggest threats can come from sources with names that are often more mundane like “Paula in Accounting” or “Dave...

/ September 26, 2018
Threat hunting could be very good for managed services providers

Threat hunting could be very good for managed services providers

In their zeal to be seen to be doing more about cybersecurity, vendors are increasingly embedding threat monitoring capabilities within a variety of applications to make it easier to hunt for malware. But even when vendors decide to make threat detection...

/ September 25, 2018
Single sign-on can simplify life for your employees

Single sign-on can simplify life for your employees

As you company collects cloud services, it can be a pain tracking logins. A good way to get around that problem is providing your users with a single sign-on. This is a delightful concept that gives your users a single...

/ September 21, 2018
Fileless attacks are lurking threats

Fileless attacks are lurking threats

You’ve installed all the latest antivirus programs and firewalls for your SMB clients, and their networks are safe and sound. When things are working well, a calm status quo makes everyone happy. Unfortunately, a placid surface doesn’t necessarily mean there’s...

/ September 18, 2018
Two-factor authentication can solve the worst password problems

Two-factor authentication can solve the worst password problems

Small to medium-sized businesses often struggle with identity management because they lack the resources of big companies to implement enterprise solutions, but something as simple as two-factor authentication can help keep your company secure. Two-factor authentication simply means that after...

/ September 14, 2018
Biggest cybersecurity challenge MSPs face today is pride and prejudice

Biggest cybersecurity challenge MSPs face today is pride and prejudice

A recent survey of 250 senior IT leaders suggests that when it comes to cybersecurity, organizations are reluctant to completely outsource the management of their security operations centers (SOCs). The State of SOAR Report 2018 survey was conducted by Virtual...

/ September 11, 2018