Category: Security

Foreshadow vulnerability
When the vulnerabilities hit your CPU, you can only wait for patches

When the vulnerabilities hit your CPU, you can only wait for patches

Just when you thought it was safe to open up your computer, word emerged this month of another Intel chip vulnerability called L1TF / Foreshadow or more commonly just Foreshadow. According to TechRepublic, it’s eerily similar to the Spectre/Meltdown issues discovered...

/ August 27, 2018
Foreshadow foreshadowing trouble ahead?

Foreshadow foreshadowing trouble ahead?

Foreshadow has joined Spectre and Meltdown on the list of Intel’s announced chip security vulnerabilities this year. Intel announced the vulnerability and released a well-produced video explaining the lapse and recommended fixes. While Intel’s response to Spectre and Meltdown earlier...

/ August 21, 2018
Ask an MSP Expert: What do I need to teach my customers to keep them safe from ransomware?

Ask an MSP Expert: What do I need to teach my customers to keep them safe from ransomware?

Q: Recently, one of my customers was hit with ransomware and ended up needing to pay a hefty ransom. I’ve tried to warn some of my customers about cyber threats in the past, but I can’t seem to get through....

/ August 20, 2018
k-12 security
How MSPs can help conquer K-12 security challenges

How MSPs can help conquer K-12 security challenges

The ubiquitous yellow school buses are starting to rumble down the roads. High school athletes can be seen out on practice fields. Work-from-home parents will soon have their days “free” again. And for MSPs that manage school networks, summer breaks...

/ August 17, 2018
data rights management
Clive Longbottom: MSPs need to think beyond physical security

Clive Longbottom: MSPs need to think beyond physical security

As an MSP, you probably spend a lot of time making sure that your platform is secure — using long, complex passwords and (hopefully) two-factor authentication wherever possible; specifically named superuser accounts, rather than general shared sysadmin ones; heuristic-based anti-malware...

/ August 15, 2018
fax security
When it comes to security, even your fax machine could be vulnerable

When it comes to security, even your fax machine could be vulnerable

The fax machine, that ancient document-transmission tool, is still in use in many offices. You would think that technology that was invented in the 19th century, and popularized in offices in the 1980s, would be fairly safe when it comes...

/ August 14, 2018
MSPs have a vested interest in providing end users with cybersecurity training

MSPs have a vested interest in providing end users with cybersecurity training

Given the costs of investigating security breaches and then cleaning up after them, managed service providers (MSPs) arguably now have a vested interest in training end users to better recognize cybersecurity threats. After all, it’s the MSP that usually absorbs...

/ August 14, 2018
election security
How MSPs can help keep elections secure

How MSPs can help keep elections secure

While most of the the country has been focused on the waning days of summer vacation, splash pads, swimming pools, and back-to-school sales, the eyes of the political world were focused on a tiny slice of Ohio this week in...

/ August 9, 2018
AI for MSPs
Ask an MSP Expert: How can I capitalize on AI as an MSP?

Ask an MSP Expert: How can I capitalize on AI as an MSP?

Q: AI seems to be everywhere I look these days! How can I capitalize on the AI opportunity as an MSP? What ways should I be using it? Artificial intelligence can feel like a buzzword, but MSPs that are paying...

/ August 6, 2018
BYODs and MSPs: Security headache or harmless convenience?

BYODs and MSPs: Security headache or harmless convenience?

BYOD. Sounds like something you’d see scrawled on an invitation to a party. Actually, if you attend the parties I do, “Bring Your Own Device” would be accurate. Nowadays, everyone sits around and scrolls on their devices. If someone does...

/ August 2, 2018