Results for: ransomware

Email threat types: Malware

Email threat types: Malware

Email attacks often come in the form of a harmless-looking email with malware attached as a .zip file or embedded in an email attachment. This malware could install ransomware, spyware, and other damaging programs. Malware is short for ‘malicious software’ and...

/ October 5, 2020
Ask an MSP Expert: Should I outsource my cybersecurity?

Ask an MSP Expert: Should I outsource my cybersecurity?

Q: Our MSP is known for its robust and affordable cybersecurity. I’ve heard, however, that MSPs should outsource their own cybersecurity. What are your thoughts? MSPs have recently suffered a spate of cybersecurity glitches that have cast a spotlight on...

/ September 21, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zerologon Attack Targeting Windows Servers

Cybersecurity Threat Advisory: Zerologon Attack Targeting Windows Servers

Advisory Overview A critical vulnerability has been discovered which affects potentially all Windows domain controllers and can allow an unauthenticated attacker on the network to take control of an Active Directory domain controller at will. This can allow the attacker...

/ September 17, 2020
Hackers join the back to school rush

Hackers join the back to school rush

Around the world, workers are dealing with the new reality of having their offices at home. But professionals aren’t the only ones needing to adapt to being at home for the long haul; students are too. And MSPs and IT...

/ September 17, 2020
Municipal contracts and the cybersecurity data to land them

Municipal contracts and the cybersecurity data to land them

A recent note came to me from a Smarter MSP reader about municipal contracts, and what types of cybersecurity data should be used when trying to land municipal contracts. Assuming they are not the only one with questions on this...

/ August 20, 2020
MSPs must watch out for TrickBot

MSPs must watch out for TrickBot

The history of malware is littered with viruses that were created solely to obtain banking information. One of the best known in recent years has been TrickBot, and lately, it has re-emerged with increased intensity. Since at least 2016, TrickBot...

/ August 6, 2020 / 8 Comments
Seamless cybersecurity and two emerging threats

Seamless cybersecurity and two emerging threats

For most MSPs, the pandemic of 2020 has been a rush of implementing new policies and procedures while at the same time trying to keep customer cybersecurity fortifications intact. Wisconsin-based SWICKTech is an example of an organization that acted early to...

/ July 23, 2020
Summer cybersecurity dangers

Summer cybersecurity dangers

In simpler times, some businesses would literally hang a sign on their door each summer saying “Gone Fishin’” and close for two weeks. In today’s world, hackers might as well hang a sign on their door in summer that says...

/ July 9, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: F5 Critical Vulnerability Exploited in Wild (CVE-2020-5902)

Cybersecurity Threat Advisory: F5 Critical Vulnerability Exploited in Wild (CVE-2020-5902)

Advisory Overview A Remote Code Execution (RCE) vulnerability exists in the BIG-IP application delivery controller (ADC) software’s Traffic Management User Interface (TMUI). The vulnerability could allow an attacker to execute remote commands or arbitrary code without the need for authentication,...

/ July 7, 2020
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: VMware Cloud Director Flaws (CVE 2020-3956)

Cybersecurity Threat Advisory: VMware Cloud Director Flaws (CVE 2020-3956)

Advisory Overview VMware Cloud Director is potentially vulnerable to a remote code injection attack that would allow an attacker to view/modify databases and escalate privileges from organizational admin to system admin. SKOUT advises updating VMware Cloud Director to version 10.1.0...

/ June 22, 2020