Tag: cyber security

A low-tech standby for cybersecurity

A low-tech standby for cybersecurity

With all the cybersecurity tools in the arsenal of the average MSP, there’s one that often gets understandably overlooked: paper and marker. Yes, patching, anti-virus protection, double authentication, and firewalls are the most crucial elements of your cybersecurity regime, but...

/ August 21, 2019
Targeted ransomware attacks creates new opportunities and challenges

Targeted ransomware attacks creates new opportunities and challenges

Every successful high-profile ransomware attack that winds up gaining a lot of mainstream media coverage is generally good for managed service providers (MSPs) that specialize in helping organizations recover from such attacks. In the last few days, coverage of ransomware...

/ August 21, 2019
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019
Survey shines light on chronic need for actionable cybersecurity intelligence

Survey shines light on chronic need for actionable cybersecurity intelligence

A survey of 577 IT and IT security practitioners in the U.S. conducted by The Ponemon Institute on behalf of AttackIQ, a provider of security testing tools, suggests there’s a major opportunity for managed service providers (MSPs) to provide security...

/ August 13, 2019
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019
Increased connectivity leads to increased security needs

Increased connectivity leads to increased security needs

When it comes to IoT, there’s no limit to the thoughts from experts and security professionals about strategies for adapting to the rapidly changing connectivity landscape in the average office. This landscape is changing daily. One statement we can make with...

/ August 7, 2019
Fallout from high profile breaches will have major impact on IT service providers

Fallout from high profile breaches will have major impact on IT service providers

A recent series of high-profile data breaches is likely to have a profound impact on IT service providers for years to come.

/ August 6, 2019
Email is ripe for hacker exploitation

Email is ripe for hacker exploitation

Hackers and scammers have learned over the years that the best way to get your employees’ attention is through a cleverly disguised email with a malware-infested link — sometimes asking for ransom. Regardless, it’s often employees who click these links...

/ August 2, 2019
Cities of all sizes are being targeted by ransomware attacks

Cities of all sizes are being targeted by ransomware attacks

Last year, it was Atlanta that was brought to its knees by a ransomware attack, sending the city reeling for weeks. This year, it was Baltimore’s turn. The ranks of municipal ransomware victims looks very different.

/ July 31, 2019
Ask an MSP Expert: How can I overcome SMBs’ security fatigue?

Ask an MSP Expert: How can I overcome SMBs’ security fatigue?

Q: When it comes to security, I feel like our SMB customers just want to tune us out! How can I communicate with customers who are tired of hearing about security? As an IT service provider, one of the most...

/ July 29, 2019