Tag: cybersecurity

Tech Time Warp
Tech Time Warp: Nimda worm slows traffic with multiple propagation methods

Tech Time Warp: Nimda worm slows traffic with multiple propagation methods

In this week’s Tech Time Warp, we look back to September 2001. While the world was reeling from the 9/11 terrorist attacks, hackers unleashed a new threat: a worm that could modify existing websites to trick users into downloading malware....

/ September 15, 2023
Cybersecurity on the healthcare edge

Cybersecurity on the healthcare edge

A new report from AT&T on cybersecurity and edge computing highlights a growing area of concern. The report shows that edge computing in healthcare is rapidly increasing,  leading to more vulnerabilities in cybersecurity. These vulnerabilities, however, can be turned into...

/ September 14, 2023
CISA looks to rally RMM community to improve MSP security

CISA looks to rally RMM community to improve MSP security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is now focusing on fixing systematic risks in the remote monitoring and management (RMM) tools that most managed service providers (MSPs) employ. The agency, as part of a Joint Cyber Defense Collaborative...

/ September 6, 2023
What exactly is killware, and why is it the next major cyberthreat?

What exactly is killware, and why is it the next major cyberthreat?

Given the surge of incidents within the past decade, many people are becoming familiar with ransomware and data breaches. However, a new type of cyberattack known as killware has emerged in recent years, and it’s now a major security issue for organizations....

/ September 5, 2023
Whiffy Recon geolocation
Whiffy Recon highlights geolocation vulnerabilities

Whiffy Recon highlights geolocation vulnerabilities

Geolocation devices are great for keeping tabs on your teenagers or finding the quickest route to the campsite. However, geolocation technology is increasingly a weapon wielded by cybercriminals, and protecting against its use is problematic. Why are geolocation devices a...

/ August 30, 2023
Tech Time Warp
Tech Time Warp: Why the Panix attack was a wake-up call

Tech Time Warp: Why the Panix attack was a wake-up call

In this week’s Tech Time Warp, we take a look at how a work emergency is never good news—and when notice of it comes late on a Friday afternoon, it’s even worse. Especially when the news is that your internet...

/ August 25, 2023
MSPs need to be prepared for summer disasters

MSPs need to be prepared for summer disasters

We have reached the middle of August and are on the cusp of peak hurricane season. But we don’t need a disastrous hurricane to hit the United States for cybercriminals to stalk their victims. The U.S. has already had its...

/ August 24, 2023
Tip Tuesday: Optimizing multi-cloud network management

Tip Tuesday: Optimizing multi-cloud network management

Multi-cloud strategies are quickly becoming the norm for businesses today. Managed service providers (MSPs) offering cloud-based services can benefit from these architectures more than most, as their scalability and reliability create convenience for end users. However, managing multi-cloud networks can...

/ August 15, 2023
MSSPs need to stage cybersecurity interventions

MSSPs need to stage cybersecurity interventions

A pair of reports conducted separately by Google and Cado Security make it clear that when it comes to cloud security, the biggest issues are mundane lapses that cybercriminals have learned to exploit easily. The Google report, for example, finds...

/ August 14, 2023
Biggest obstacle for MSSPs is customer overconfidence

Biggest obstacle for MSSPs is customer overconfidence

One of the biggest issues any managed security services provider (MSSP) regularly encounters is, despite all evidence to the contrary, many IT and cybersecurity professionals remain convinced they have all the tools and processes needed to secure their IT environments....

/ August 7, 2023