Category: Security

The state of security does not feel terribly secure

The state of security does not feel terribly secure

It was yet another week of bad security news. We heard about hackers who had been breaking into cell phone networks and stealing call records for years. Then, we heard about vulnerabilities in the Global Entry System. It hasn’t resulted...

/ July 1, 2019
Healthcare organizations need MSPs to serve as guards

Healthcare organizations need MSPs to serve as guards

Last week, we looked at some of the emerging cybersecurity healthcare hazards in 2019, from ransomware to crypto. As healthcare continues to become more and more connected, the MSP’s role has never been more significant, especially with smaller to medium-sized healthcare...

/ June 26, 2019
Ask an MSP Expert: How can we improve customers’ security posture?

Ask an MSP Expert: How can we improve customers’ security posture?

Q: In today’s world, we know that security is a vital part of any managed service provider’s offering. How can we better position our security portfolio while improving our customers’ security posture? When small and medium businesses look to partner...

/ June 24, 2019
The healthcare slice of the MSP pie continues to grow

The healthcare slice of the MSP pie continues to grow

For the second year in a row, the top security niche that MSPs are focusing in on, is the healthcare industry. As hospitals expand and medical wearables are becoming more common, organizations with skeletal IT staffs are looking more and...

/ June 19, 2019
Tech Time Warp: First mobile malware makes its debut

Tech Time Warp: First mobile malware makes its debut

Back in the pre-smartphone days, an international group of hackers set out to prove no technology was safe from malware. In June 2004, the group 29A — 29A being the hexadecimal version of “666” — released the first virus targeting...

/ June 14, 2019
Cryptojacking is making a comeback

Cryptojacking is making a comeback

Black Squid has washed up on the cyber-shores of the United States, after first being spotted in Thailand. Unlike its oceanic counterparts, this cyber squid is destructive. Beincrypto describes the threat like this: It uses tactics such as anti-virtualization, anti-debugging,...

/ June 12, 2019
Steganography makes a comeback

Steganography makes a comeback

Steganography was malware before there was malware. In fact, the term dates back thousands of years and has only recently been used in cyber-circles. The word’s root is derived from the Greek word steganos, which means “covered” or “concealed.” Pre-technological generals used...

/ June 5, 2019
Building a defense from social engineering attacks

Building a defense from social engineering attacks

Last week Smarter MSP examined the security threat that social engineering poses to organizations  of all sizes. Social engineering is a technique that hackers use to gain access to  an organization’s network, without having to break down the metaphorical door....

/ May 29, 2019
Tech Time Warp: Prince Philip’s inbox gets hacked

Tech Time Warp: Prince Philip’s inbox gets hacked

Harry and Meghan might grab headlines for their privacy settlements and use of social media, but the younger royals are hardly breaking new ground. You might say they’re just following in the family’s footsteps. In 1985, two hackers were arrested...

/ May 24, 2019
Need for zero-trust IT environments bodes well for MSPs

Need for zero-trust IT environments bodes well for MSPs

As part of a concerted effort to improve their overall cybersecurity posture, most organizations are now moving towards building a true zero-trust IT environment. After years of pursuing a hodgepodge approach to IT, organizations are starting to realize that a...

/ May 23, 2019