Category: Security

The vulnerability of VPNs

The vulnerability of VPNs

Forget using the public WiFi at the airport or poaching the McDonald’s signal in the parking lot. You’ve installed a VPN for your client. Now when they travel out of the office for remote work, their data will be safe,...

/ October 2, 2019
Tech Time Warp: Stration worm preys on users’ best intentions

Tech Time Warp: Stration worm preys on users’ best intentions

In September 2006, the tech world was focused on a reported Windows vulnerability related to the implementation of Vector Markup Language (VML). While programmers raced to fix the VML issue, spammers capitalized on the opportunity. Using the new bug in...

/ September 27, 2019
Are banks doing enough to combat cybercrime?

Are banks doing enough to combat cybercrime?

Last week we explored the security vulnerabilities posed by banks using legacy systems and how MSPs can play a mitigation role. This week, we explore the steps banks and their security teams should be taking today to prevent the next...

/ September 25, 2019
MSPs versus the rising tide of email attacks

MSPs versus the rising tide of email attacks

For all the comings and goings of modern technology, email seems to stay. Even with the rise of enterprise messaging tools such as Slack and Microsoft Teams, email still holds an important role in how we communicate. A staple of...

/ September 25, 2019
MSPs should start investing in the banking industry

MSPs should start investing in the banking industry

Financial firms have long been at the forefront of malware attacks. In fact, a report released this year shows that a full 25 percent of attacks are aimed at businesses in the finance industry. The reasons for “virtual bank robberies”...

/ September 18, 2019
Long road to achieving GDPR compliance still lies ahead

Long road to achieving GDPR compliance still lies ahead

A survey of 1,263 IT professionals conducted by the Ponemon Institute, on behalf of the law firm McDermott Will & Emery LLP, suggests that even some of the best laid plans to comply with the General Data Protection Rule (GDPR)...

/ September 17, 2019
Helping SMBs comply with GDPR and other privacy laws

Helping SMBs comply with GDPR and other privacy laws

As cybersecurity incidents continue to increase globally, governments are starting to step in to protect their citizen’s personally identifiable information (PII). GDPR went into effect in the EU last year and the California Consumer Privacy Act (CCPA), which is set to launch on...

/ September 16, 2019
MSPs can go to the dogs

MSPs can go to the dogs

Everyone knows about the importance of safeguarding health data, and the incredible connectivity that is transforming healthcare. Hospitals and doctors’ offices are now cyber hubs dispensing medical wearables, promoting telemedicine, and building connected clinics. However, in their rush to corner...

/ September 11, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: UK National Cyber Security Centre Urges Python Migration

Cybersecurity Threat Advisory: UK National Cyber Security Centre Urges Python Migration

Advisory Overview: The UK National Cyber Security Centre (NCSC) has warned developers to migrate from Python 2.X to Python 3.X based code due to an upcoming end of life date of January 1st, 2020. By continuing to use unsupported versions...

/ September 9, 2019
Tech Time Warp: Microsoft chases a storm

Tech Time Warp: Microsoft chases a storm

In early 2007, network administrators began dealing with a trojan that grew into a massive botnet and even stumped Microsoft for more than a year. The Storm worm initially spread via email, promising the recipient news about dangerous storms in...

/ September 6, 2019