Category: Security

Ask an MSP Expert: How do I make sure my Office 365 data is safe?

Ask an MSP Expert: How do I make sure my Office 365 data is safe?

Q: We have clients who run almost their entire business on Office 365. However, most of them decline additional security services because they think that “Microsoft has my back,” but how true is that? To answer this question, Smarter MSP...

/ September 3, 2019 / 1 Comment
When throttling is acceptable

When throttling is acceptable

I have previously written about how important it is to be flexible with customers, allowing the occasional traffic burst to go unnoticed – well, at least as far as the invoice is concerned. The problem is when that traffic burst...

/ September 2, 2019
Five off-the-radar security threats

Five off-the-radar security threats

Complacency is a formidable enemy. You have a robust patching regimen, an educational component to your MSP offerings, pen testing, and you segment data so that an attack on your client’s system can be contained and quarantined. It’s easy to...

/ August 28, 2019
Cybersecurity attacks aimed at MSPs are taking a toll

Cybersecurity attacks aimed at MSPs are taking a toll

For the better part of a year now, managed service providers (MSPs) have been the focal point of a series of attacks that are starting to erode customer confidence. A survey of 476 attendees at the recent Black Hat USA...

/ August 27, 2019
Tech Time Warp: SoBig.F worm creates some big problems

Tech Time Warp: SoBig.F worm creates some big problems

It’s amazing that the unwitting computer users of 2019 are still clicking on suspicious attachments considering the havoc such files have been wreaking for decades. Back in August 2003, the SoBig.F virus — the sixth variant of the SoBig worm...

/ August 23, 2019
A low-tech standby for cybersecurity

A low-tech standby for cybersecurity

With all the cybersecurity tools in the arsenal of the average MSP, there’s one that often gets understandably overlooked: paper and marker. Yes, patching, anti-virus protection, double authentication, and firewalls are the most crucial elements of your cybersecurity regime, but...

/ August 21, 2019
Targeted ransomware attacks creates new opportunities and challenges

Targeted ransomware attacks creates new opportunities and challenges

Every successful high-profile ransomware attack that winds up gaining a lot of mainstream media coverage is generally good for managed service providers (MSPs) that specialize in helping organizations recover from such attacks. In the last few days, coverage of ransomware...

/ August 21, 2019
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019
Survey shines light on chronic need for actionable cybersecurity intelligence

Survey shines light on chronic need for actionable cybersecurity intelligence

A survey of 577 IT and IT security practitioners in the U.S. conducted by The Ponemon Institute on behalf of AttackIQ, a provider of security testing tools, suggests there’s a major opportunity for managed service providers (MSPs) to provide security...

/ August 13, 2019
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019