Category: Security
Tech Time Warp: Fernando Corbató, father of the computer password
Each October, the U.S. Department of Homeland Security shares tips and tricks for tech safety during National Cybersecurity Awareness Month. Naturally, a key focus is using strong, secure passwords — tips the father of the computer password, Fernando Corbató, could...
Cybersecurity Threat Advisory: Comodo Security Breached by vBulletin Zero Day
Advisory Overview: Cybersecurity firm Comodo – who provides website security certificates and other services – recently suffered a breach of their web forum site which included usernames, IP addresses, and other data of forum users. Since many users re-use credentials...
Cybersecurity Threat Advisory: Microsoft Releases Patch for Internet Explorer Vulnerability
Advisory Overview: Microsoft has released an emergency patch for Internet Explorer (multiple versions) that fixes a critical vulnerability in that browser. By manipulating Internet Explorer via a specially-configured website, a threat actor can gain privileges equal to the user who...
Cybersecurity Threat Advisory: LastPass Bug Leaks Credentials From Previous Site
Advisory Summary: LastPass is a very popular and widely used password manager – software designed to save user passwords, create secure passwords, and automatically fill in usernames and passwords on websites. Recently, security researchers have discovered that JavaScript embedded in...
MSP provides comprehensive network and email security
NoctisIT has been serving the Austin, Texas area since 2013, providing technical help desk support, computer support, and consulting services to small and mid-size businesses. The service provider’s security expertise has contributed to its demand, not only in protecting highly...
What it really takes to become a Managed Security Services Provider (MSSP)
If an IT solution provider wants to become a managed security services provider (MSSP), they will need the ability to remediate a cybersecurity breach in well under two hours, based on how long it currently takes the average IT organization...
The vulnerability of VPNs
Forget using the public WiFi at the airport or poaching the McDonald’s signal in the parking lot. You’ve installed a VPN for your client. Now when they travel out of the office for remote work, their data will be safe,...
Tech Time Warp: Stration worm preys on users’ best intentions
In September 2006, the tech world was focused on a reported Windows vulnerability related to the implementation of Vector Markup Language (VML). While programmers raced to fix the VML issue, spammers capitalized on the opportunity. Using the new bug in...
Are banks doing enough to combat cybercrime?
Last week we explored the security vulnerabilities posed by banks using legacy systems and how MSPs can play a mitigation role. This week, we explore the steps banks and their security teams should be taking today to prevent the next...
MSPs versus the rising tide of email attacks
For all the comings and goings of modern technology, email seems to stay. Even with the rise of enterprise messaging tools such as Slack and Microsoft Teams, email still holds an important role in how we communicate. A staple of...