Category: Security

Tech Time Warp: The one with Anna Kournikova

Tech Time Warp: The one with Anna Kournikova

Think before you click. It’s a mantra that could have stopped so many email viruses in their tracks. After all, if it sounds too good to be true, it probably is — and that was the case with the Anna...

/ February 8, 2019
Is two-factor authentication enough? Not without education, experts say

Is two-factor authentication enough? Not without education, experts say

For what seems like a decade or more, two-factor authentication has been the gold standard of cybersecurity. We’re all used to it by now, and it’s one of the most used tools. You don’t build a robust defense without two-factor...

/ February 6, 2019
Three system weaknesses MSPs should be watching out for

Three system weaknesses MSPs should be watching out for

In the pre-internet age, a virus was something that required a tissue and aspirin, phishing meant you followed around a grunge band, and patching’s tech definition was limited to putting through a phone call. Fast-forward to today, where viruses spread...

/ January 30, 2019
The case for micro-segmentation

The case for micro-segmentation

A recent report by BCC Research shows that the MSP market in the United States will grow from $62.0 billion in 2017 to $94.5 billion in 2021. While banking, insurance, and financial industries continue to dominate an MSP’s clientele, the...

/ January 23, 2019
Are chatbots the next major cyber security threat?

Are chatbots the next major cyber security threat?

Me: “Where can I find a course catalogue online?” SmooSmoo: “Yep, I believe I know this one. 😉 I’ve found there’s an answer for your question, but it is not a public article. You need to login first to reveal the...

/ January 16, 2019
Ask an MSP Expert: How do we protect our healthcare clients’ data?

Ask an MSP Expert: How do we protect our healthcare clients’ data?

Q: We have a growing number of healthcare clients. Maintaining their security used to be not that much different from our other customers, but with the explosion of IoT, there are so many more threats that they are susceptible to....

/ January 14, 2019 / 1 Comment
Malicious memes?

Malicious memes?

We’ve all seen them and laughed at them. There’s “Grumpy Cat” or “Be Like Bill.”  In some cases, these memes have racked up over a billion views. That’s almost 20 percent of the world’s population who have been “dancing like the...

/ January 9, 2019 / 1 Comment
6 areas for MSPs to watch in 2019

6 areas for MSPs to watch in 2019

2019. We have a year to get comfortable with those four digits, and it’s a good thing because they will bring quite a few changes to the growing IoT ecosystem and a few security challenges. We know you’re busy unwrapping...

/ January 1, 2019
When it comes to security, you’re never done

When it comes to security, you’re never done

It’s safe to say that 2018 wasn’t a great year for security. Even the biggest companies in the world struggled to defend themselves against the constant onslaught of hacking attempts.

/ December 26, 2018
Can malware physically damage a computer?

Can malware physically damage a computer?

The idea that a computer virus could damage hardware is something that has plagued the cyber community. Some of the more sensational stories out there suggest that it’s possible to send a bomb via email. I stumbled upon this article,...

/ December 19, 2018 / 1 Comment