Results for: ransomware

cybersecurity training
Increased demand for cybersecurity training is a gap MSPs should fill

Increased demand for cybersecurity training is a gap MSPs should fill

Just about everybody agrees end-user training is the best defense against spear phishing and other types of cybersecurity attacks that rely on social engineering. The trouble is finding someone to provide that training at a time when cybersecurity professionals are...

/ June 21, 2018
Resistance to cloud computing comes to an end

Resistance to cloud computing comes to an end

It’s been a long time coming, but a new survey suggests resistance to cloud computing has now all but fallen. A survey of 1,554 IT professionals and C-level executives conducted by EvolveIP, a provider of cloud services, finds that 92...

/ June 12, 2018
cyber threats on the prairie
Little MSP on the Prairie: Cyber threats lurk in the heartland

Little MSP on the Prairie: Cyber threats lurk in the heartland

The Great Plains have romanced explorers and broken the hearts of homesteaders for generations. For the Conestoga wagons traversing the Oregon Trail, the Great Plains were a necessary misery to endure as they headed toward the riches of the west,...

/ May 23, 2018
MSP marketing strategy
Why security should be a pillar in your MSP marketing strategy

Why security should be a pillar in your MSP marketing strategy

Looking back on my two decades of industry experience, one thing I can say for sure is that while the digital era has brought a huge number of benefits with it, it’s also brought a number of significant disadvantages, too....

/ May 16, 2018 / 4 Comments
Artificial intelligence cyber warfare
Weaponizing artificial intelligence

Weaponizing artificial intelligence

Fending off ransomware and other malware attacks has already become part of the daily MSP landscape. But in the ever-evolving world of threats, a new one will begin to emerge with greater frequency in the months and years ahead: weaponized...

/ May 3, 2018
cryptojacking
Threat Watch: Cryptojacking

Threat Watch: Cryptojacking

If one of your customers calls or texts you to tell you their system is slow or overheating or gobbling up a lot of power, you need to add a new possible diagnosis to your checklist — cryptojacking. Cryptojacking is...

/ April 5, 2018
cyberattack on CPAs
2018 will be the year of the targeted cyberattack on CPAs

2018 will be the year of the targeted cyberattack on CPAs

April tax deadlines are looming, and that means accounting firms are neck-deep in returns as everyone races to file on time. While accountants are focused on deductions and earned income credits, bad actors are watching and waiting, ready to pounce...

/ March 28, 2018
More organizations starting to come to terms with need for cybersecurity help

More organizations starting to come to terms with need for cybersecurity help

When it comes it cybersecurity an increasing percentage of IT organizations are starting to realize they are pretty much sitting ducks. A survey of 1,300 IT and security professionals conducted by CyberArk, a provider of privileged account management software, finds...

/ March 6, 2018
network risk
Alex Hoff: Is your MSP exposed to network risk?

Alex Hoff: Is your MSP exposed to network risk?

When offering a network service to clients, managing servers and endpoints—and managing them well—is important. Devices like desktops and phones are the most visible and tangible part of the network to your clients. They’re the parts clients interact with nearly constantly....

/ February 21, 2018
Internet of Things security
Cyber Security: Are you forgetting the Internet of Things

Cyber Security: Are you forgetting the Internet of Things

If you haven’t noticed the huge ransomware risk that has swept the globe in recent months, you must have been living under a rock. You know all about human error and the importance of internal access segregation, and you’ve probably...

/ February 14, 2018