Category: Security
Partner Spotlight: MSP improves efficiency with Barracuda RMM
Business Communication Systems of North Carolina (BCS of NC), based in New Bern, North Carolina, has been providing IT, security, voice and data cabling services, and phone installation to the local community since 1999. IT Director Tchitchu van Barneveld, now...
Cybersecurity Threat Advisory: Google Chrome Releases Patches for Multiple Vulnerabilities
Threat Update Following the confirmation of four serious Chrome vulnerabilities this month, Google has revealed five new vulnerabilities with a rating of “High” as well as 11 other less severe flaws known to affect versions of Chrome prior to the...
Pioneers in Tech: Agnes Meyer Driscoll, World War Codebreaker
Cybersecurity is one of the most in-demand career fields today, with nearly 465,000 open jobs in the industry as of October 2021. These positions —cybersecurity analyst, penetration and vulnerability tester, etc.— have their roots in the work of Agnes Meyer...
DOJ employs False Claims Act to strengthen federal cybersecurity
The U.S. Department of Justice is looking to encourage more organizations to beef up their cybersecurity by extending the scope of an existing False Claims Act (FCA) to pursue cases against government contractors that hide a security breach rather than...
MSPs should revisit best practices to meet guest network needs
People expect and demand connectivity everywhere. Free Wi-Fi was once the domain of coffee shops and libraries, but now businesses ranging from rustic campgrounds to hospital waiting rooms must have Wi-Fi on a guest network to keep their customers happy....
Tech Time Warp: Gone phishing for cybersecurity history
The theme for Week 2 of Cybersecurity Awareness Month is “Phight the Phish!” Arguably one of the most insidious forms of cybercrime, phishing relies on tricking a recipient via social engineering into handing over personal information—and sometimes installing malware in...
Increase in cyber resiliency is a trend for MSPs to follow
You can fortify your client’s network by installing firewalls, restricting lateral movements, putting MFA and VPNs in place, and implementing training. But sometimes, all the protections in the world aren’t good enough if someone makes a mistake and opens a...
How hackers use phishing in ransomware attacks
Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need...
Cybersecurity Threat Advisory: Apache Zero-Day Vulnerability Actively Exploited
Threat Update There are two vulnerabilities in Apache HTTP Web Server version 2.4.49 that are under active exploitation. The first vulnerability enables an attacker to perform path traversal, file disclosure, and remote code execution (RCE) abilities. The second allows the...
Cybersecurity Threat Advisory: The recent Facebook outage
On October 4, 2021, the global social network Facebook and its associated platforms faced a global outage that lasted approximately six hours. This outage not only impacted all Facebook users, but it also blocked internal communication between its employees and...
