Tag: cybersecurity

cybersecurity
Expert views on closing the cybersecurity talent gap for MSPs

Expert views on closing the cybersecurity talent gap for MSPs

The cybersecurity talent shortage in the workforce presents a direct cybersecurity threat. Statistics from the National Institute of Standards and Technology (NIST) paint a grim picture: By 2025, a lack of talent or human failure will be responsible for over...

/ April 18, 2024
Four automation priorities MSPs should focus on

Four automation priorities MSPs should focus on

Many organizations conduct surveys every year about the evolving threats and cybersecurity concerns that enterprises are faced with. Info-Tech Research Group’s report is a must-read for all security stakeholders, chief information security officers (CISOs), and managed service providers (MSPs). Some...

/ April 15, 2024
Navigate the compliance maze to unlock MSP business growth

Navigate the compliance maze to unlock MSP business growth

The cybersecurity compliance landscape continues to transform significantly as regulations get tighter and enforcement gets stricter. While businesses (and to be fair, MSPs) try to keep up, the MSP opportunity to win new business with compliance expertise and strategy is...

/ April 10, 2024
Top cybersecurity misconfigurations MSPs should address

Top cybersecurity misconfigurations MSPs should address

As we embrace spring, the fall seems to be nothing but a memory. While 2024 holds new trends, threats, and opportunities for MSPs, there are still a few things to keep in mind from 2023. In October of last year,...

/ April 9, 2024
How attackers weaponize generative AI through data poisoning and manipulation

How attackers weaponize generative AI through data poisoning and manipulation

The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

/ April 8, 2024
Spring-cleaning checklist for defending against ransomware

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

/ April 5, 2024 / 10 Comments
Ransomware 2024: The new battleground is your data, not just your files

Ransomware 2024: The new battleground is your data, not just your files

Every year, cybercriminals devise new ways to steal credentials, access sensitive data, and disrupt business. In 2024, the most significant cybersecurity challenge may actually be overcoming a familiar threat: ransomware. According to the World Economic Forum (WEF), ransomware activity was up...

/ April 2, 2024
How artificial intelligence is changing the threat landscape

How artificial intelligence is changing the threat landscape

the There has been a lot of talk about artificial intelligence (AI) and its impact on businesses. In this particular post, we will try to answer the most pertinent question: How has AI changed the threat landscape? This is like...

/ April 1, 2024
DORA
DORA: What this means for MSPs

DORA: What this means for MSPs

In many places, DORA (Designated Outdoor Refreshment Area) means you can walk the streets in designated areas with an adult beverage. But in cybersecurity circles, DORA has a completely different meaning. Landmark legislation aims to ensure digital operational resilience Managed...

/ March 25, 2024
The value of contextual data in cybersecurity

The value of contextual data in cybersecurity

Contextual data has been a term circling the cybersecurity space for a while now. What exactly is contextual data, and how can managed service providers (MSPs) leverage it to make robust protection programs for clients? Contextualized data in cybersecurity refers...

/ March 18, 2024