Results for: ransomware
5 tips for more effective cybersecurity training
Often, the cheapest and most effective weapon an MSP can deploy against hackers and malware isn’t new software or a cure-all patch, it is knowledge. And while knowledge is free, the time and resources put into it are not. Still,...
MSPs and SACA: What MSPs need to know
The President of the United States recently signed into law the Strengthening American Cybersecurity Act of 2022 (SACA). SACA is just one of many recent laws enacted to bolster cybersecurity, and something that MSPs need to have on their radar...
Ask an MSP Expert: What is the best way to expand my security service offering?
Q: We are finding it harder than ever to protect our customers with the security solutions we currently offer. Not only are they generating a lot of alerts, many of which turn out to be false positives once my team...
SMB cybersecurity confidence creates a challenge for MSPs
A survey of 600 SMBs (small-to-medium businesses) with revenue between $1 to $40 million, conducted by Provident Bank, finds that about half of the respondents believe their organization is fully prepared for a cyberattack. An equal percentage of respondents, however,...
Cybersecurity Threat Advisory: “TLStorm” vulnerability found in APC Smart-UPS devices
The security firm Armis has located three vulnerabilities in Schneider Electric’s APC Smart-UPS devices. These flaws are being tracked under the name “TLStorm.” This vulnerability can enable remote attackers to control the power of millions of enterprise devices to conduct...
MSPs should emphasize securing Guest User Accounts within SaaS apps
Guest User Accounts that SaaS application providers make available to organizations, are becoming a major security issue that managed service providers (MSPs) are arguably in the best position to resolve. A report published this week by SaaS Alerts, a provider...
Beware of Google Chrome complacency
Google Chrome is about as common in office spaces as a water cooler or a coffeemaker. Chrome is also becoming king elsewhere, unless the systems are Macs, and Safari is the browser of choice. With its minimalist, crisp interface and...
MSP legislation in the UK, Part 1
It’s no secret that MSPs (Managed Service Providers) are cybersecurity’s ace in the hole: providing services in network, application, infrastructure, and more. Whilst they have been around for some time, they are becoming more prominent in the frontal lobe of...
Cybersecurity Threat Advisory: Malicious PowerPoint Files Used to Take Over PCs
Threat Update Threat actors are creating socially engineered emails containing PowerPoint file attachments with the extension “.ppam” to hide malicious executables which can rewrite Windows registry settings to gain control over end user’s computers. It is one of many stealthy...
Cybersecurity is everyone’s responsibility
This post is part of our ongoing conversations with industry experts about the ever-present problem of data breaches. These breaches usually trace back to the security teams, but everyone, even the average user, is considered a stakeholder in cybersecurity. IBM...