Tag: cybersecurity
Good security is about controlling what you can control
Last year was a terrible year in so many respects, so it’s not overly surprising that there were a number of historic hacks. Some of these were so vast and so all-encompassing, it could make you feel like you can’t...
The benefits of an MSSP
The managed security service provider (MSSP) business is currently a fast-growing one, thanks to the evolving threats to cybersecurity. Hackers are improving their ability to infiltrate networks, and business leaders that didn’t consider cybersecurity previously are looking for ways to...
A look back at cybersecurity in 2020
As happy as some of us might be to watch 2020 disappearing into the rearview mirror, we should first indulge in our annual look back to see what cybersecurity trends emerged. By learning from what worked and what didn’t, we...
Domains impersonating news sites emerge as cybersecurity threat
SmarterMSP has highlighted the recent danger of malware and ransomware coming into email boxes tied to news of the day. An example might be an email appeal for funds related to post-election legal action or rebuilding after California’s wildfires. Other...
The cloud-breaching headlines keep piling up
The cloud has been victim to several high-profile breaches in recent weeks. The latest involves Pharmaceutical giant Pfizer, which suffered a significant breach of unsecured cloud data. According to Security Boulevard: The exposed data, including email addresses, home addresses, full...
Email threat types: Domain Impersonation
Domain impersonation, also known as typosquatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate domains, such as Barracudamsp.com, by creating domains that appear similar. Such a domain might be accessed by a user typing the...
MSPs and election cybersecurity
MSPs have emerged as central players in the democracy machinery. And after a rash of recent attacks on MSPs, some worry that MSPs may face a new challenge in election cybersecurity for the United States’ upcoming Presidential elections. Tim Davis,...
The Creeper and the Reaper make cybersecurity history
“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”
Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”
Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...
Managing data sprawl
As a managed service provider (MSP), data is one of the many things we are responsible for. However, the shift to remote working, followed by partial staff returns to the office, with the possibility of workforces heading back home again...