Category: Security

cybersecurity
MSPs have an opportunity to change the cybersecurity game

MSPs have an opportunity to change the cybersecurity game

For as long as anyone can remember, cybersecurity has been a game of whac-a-mole where resources are hopefully marshaled in time to thwart a threat either before damage is inflicted or, at the very least, as quickly as possible once...

/ February 26, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Active exploitation of Microsoft vulnerability

Cybersecurity Threat Advisory: Active exploitation of Microsoft vulnerability

Microsoft announced that a recently disclosed security flaw had been exploited just one day after it released fixes for the vulnerability. CVE-2024-21410, an Exchange Server vulnerability, with a CVSS score of 9.8, allows threat actors to escalate privileges of the...

/ February 21, 2024
XDR Threats
XDR round-up 2023: High-severity threats on the rise, peak during holidays

XDR round-up 2023: High-severity threats on the rise, peak during holidays

In 2023, Barracuda XDR, including its team of SOC analysts on 24-hour watch, cut through nearly two trillion (1,640 billion) IT events to isolate tens of thousands of potentially high-risk security threats. Security researchers have analyzed the most prevalent XDR detections...

/ February 21, 2024 / 14 Comments
Cybersecurity priorities
Cybersecurity priorities for MSPs to focus on this year

Cybersecurity priorities for MSPs to focus on this year

Many organizations conduct surveys every year about the evolving threats and cybersecurity concerns that enterprises are faced with. Info-Tech Research Group’s report is a must-read for all security stakeholders, chief information security officers (CISOs), and managed service providers (MSPs). Some...

/ February 19, 2024
email
How to help your clients comply with new Google and Yahoo email requirements

How to help your clients comply with new Google and Yahoo email requirements

When it comes to email security, most of the focus is on what happens when a malicious email is received. Optimally, a multi-layered approach will help filter out phishing emails and other attacks via technology and user training. But some...

/ February 15, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New Ivanti vulnerability

Cybersecurity Threat Advisory: New Ivanti vulnerability

Ivanti has warned customers of a new security flaw that could allow attackers to bypass authentication. The vulnerability, CVE-2024-22024, has received a CVSS score of 8.3. Read this Cybersecurity Threat Advisory to learn the significant risk this threat poses to...

/ February 14, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical vulnerability in FortiOS

Cybersecurity Threat Advisory: Critical vulnerability in FortiOS

Fortinet has disclosed a critical vulnerability affecting FortiOS, the operating system that runs on Fortigate SSL VPNs. The vulnerability known as CVE-2024-21762, received a CVSS score of 9.6. Please review the following recommendations in this Cybersecurity Threat Advisory to mitigate...

/ February 13, 2024
cloud
Report reveals cloud optimization opportunity for MSPs

Report reveals cloud optimization opportunity for MSPs

Despite rising concerns about the cost of cloud computing, a new report finds more than half of organizations do not make use of Saving Plans or Reserved Instances. These plans, available on the Amazon Web Services (AWS) cloud, make it...

/ February 12, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Patches for critical vulnerabilities

Cybersecurity Threat Advisory: Patches for critical vulnerabilities

Security patches were recently released from various vendors including Cisco, Fortinet, and VMware. Read this Cybersecurity Threat Advisory as it shares the impact of each of the vulnerabilities and how to mitigate the risks they pose. What is the threat?...

/ February 9, 2024
zen
Zen and the art of cyber defense maintenance

Zen and the art of cyber defense maintenance

In my previous article, I looked at how, like a motorcyclist, security providers and managed service providers (MSPs) can employ the SIPDE methodology as part of their ongoing cybersecurity services. In this piece, I am taking a look at the parallels between motorcycle...

/ February 7, 2024