Tag: cybersecurity

Domains impersonating news sites emerge as cybersecurity threat

Domains impersonating news sites emerge as cybersecurity threat

SmarterMSP has highlighted the recent danger of malware and ransomware coming into email boxes tied to news of the day. An example might be an email appeal for funds related to post-election legal action or rebuilding after California’s wildfires. Other...

/ November 12, 2020
The cloud-breaching headlines keep piling up

The cloud-breaching headlines keep piling up

The cloud has been victim to several high-profile breaches in recent weeks. The latest involves Pharmaceutical giant Pfizer, which suffered a significant breach of unsecured cloud data. According to Security Boulevard: The exposed data, including email addresses, home addresses, full...

/ November 5, 2020
Email threat types: Domain Impersonation

Email threat types: Domain Impersonation

Domain impersonation, also known as typosquatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate domains, such as Barracudamsp.com, by creating domains that appear similar. Such a domain might be accessed by a user typing the...

/ October 26, 2020
MSPs and election cybersecurity

MSPs and election cybersecurity

MSPs have emerged as central players in the democracy machinery. And after a rash of recent attacks on MSPs, some worry that MSPs may face a new challenge in election cybersecurity for the United States’ upcoming Presidential elections. Tim Davis,...

/ October 19, 2020
The Creeper and the Reaper make cybersecurity history

The Creeper and the Reaper make cybersecurity history

“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

/ October 16, 2020
Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”

Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”

Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...

/ October 9, 2020
Managing data sprawl

Managing data sprawl

As a managed service provider (MSP), data is one of the many things we are responsible for. However, the shift to remote working, followed by partial staff returns to the office, with the possibility of workforces heading back home again...

/ September 29, 2020
Cybersecurity best practices for back-to-school 2020

Cybersecurity best practices for back-to-school 2020

Hackers have been exploiting weaknesses in school networks as campuses reopen in varying degrees during the pandemic. Schools of all sizes, though, are finding out what a threat hackers can pose to the educational process. The superintendent of the Valparaiso...

/ September 24, 2020
Ask an MSP Expert: Should I outsource my cybersecurity?

Ask an MSP Expert: Should I outsource my cybersecurity?

Q: Our MSP is known for its robust and affordable cybersecurity. I’ve heard, however, that MSPs should outsource their own cybersecurity. What are your thoughts? MSPs have recently suffered a spate of cybersecurity glitches that have cast a spotlight on...

/ September 21, 2020
Hackers join the back to school rush

Hackers join the back to school rush

Around the world, workers are dealing with the new reality of having their offices at home. But professionals aren’t the only ones needing to adapt to being at home for the long haul; students are too. And MSPs and IT...

/ September 17, 2020