Tag: cyber security

Tech Time Warp: The curious cases of early hackers

Tech Time Warp: The curious cases of early hackers

These days, cybersecurity is such a pervasive concern that it’s easy to forget law enforcement and the courts once had no idea what to do with hackers. Some of the earliest cases of hacking and computer fraud predate the federal...

/ October 19, 2018
Ask an MSP Expert: What if my MSP gets hacked?

Ask an MSP Expert: What if my MSP gets hacked?

Q: Recently, the Department of Homeland Security issued a warning stating that advanced persistent threat actors are now targeting MSPs. We work with customers in highly regulated industries, so we have a lot of sensitive data to protect. What should I...

/ October 15, 2018
Tech Time Warp: Big-time data breaches and the cybersecurity sins that led to them

Tech Time Warp: Big-time data breaches and the cybersecurity sins that led to them

Cybersecurity often seems like a moving target. The bad guys have a seemingly endless supply of spammy servers, plus all the time and budget in the world, whereas those charged with protecting companies from cybercrime face normal business constraints in...

/ October 12, 2018
MSPs need to stay relevant in the age of the cloud

MSPs need to stay relevant in the age of the cloud

There are two inexorable facts about cybersecurity and email that managed service providers (MSPs) can’t ignore. The first is that for all intents and purposes, email has become a cloud service. There may be some organizations still running a Microsoft...

/ October 11, 2018
Biometric conversations for MSPs

Biometric conversations for MSPs

Passwords are a cornerstone of the various security deployments that MSPs put in place for their customers. Password technology, however, has changed little since the dawn of the modern computer age. How long before the password is replaced with something...

/ October 10, 2018
Tech Time Warp: Spotlight on the FBI Cyber Division

Tech Time Warp: Spotlight on the FBI Cyber Division

These days, a sexy, offbeat hacker is a movie trope — a recent example Rihanna’s portrayal of “Nine Ball” in the glamorous Ocean’s Eight. Armed with laptops in chunky cases, these hackers use a few keystrokes to hack into government...

/ October 5, 2018
The pros and cons of biometrics

The pros and cons of biometrics

A new malware targeting banking customers in Brazil calls into question the security of biometric account protections. Interestingly, the sophisticated attack – dubbed as CamuBot, uses very low-tech, retro ways to target its victims. CamuBot was recently described in ThreatPost...

/ October 3, 2018
The dangers lurking in SMB networks

The dangers lurking in SMB networks

The most significant risks to your SMB customers don’t always come from threats with catchy names like Wanna Cry. Instead, the biggest threats can come from sources with names that are often more mundane like “Paula in Accounting” or “Dave...

/ September 26, 2018
Threat hunting could be very good for managed services providers

Threat hunting could be very good for managed services providers

In their zeal to be seen to be doing more about cybersecurity, vendors are increasingly embedding threat monitoring capabilities within a variety of applications to make it easier to hunt for malware. But even when vendors decide to make threat detection...

/ September 25, 2018
Fileless attacks are lurking threats

Fileless attacks are lurking threats

You’ve installed all the latest antivirus programs and firewalls for your SMB clients, and their networks are safe and sound. When things are working well, a calm status quo makes everyone happy. Unfortunately, a placid surface doesn’t necessarily mean there’s...

/ September 18, 2018