Tag: cybersecurity

Good security is about controlling what you can control

Good security is about controlling what you can control

Last year was a terrible year in so many respects, so it’s not overly surprising that there were a number of historic hacks. Some of these were so vast and so all-encompassing, it could make you feel like you can’t...

/ January 19, 2021
The benefits of an MSSP

The benefits of an MSSP

The managed security service provider (MSSP) business is currently a fast-growing one, thanks to the evolving threats to cybersecurity. Hackers are improving their ability to infiltrate networks, and business leaders that didn’t consider cybersecurity previously are looking for ways to...

/ January 4, 2021
A look back at cybersecurity in 2020

A look back at cybersecurity in 2020

As happy as some of us might be to watch 2020 disappearing into the rearview mirror, we should first indulge in our annual look back to see what cybersecurity trends emerged. By learning from what worked and what didn’t, we...

/ December 31, 2020
Domains impersonating news sites emerge as cybersecurity threat

Domains impersonating news sites emerge as cybersecurity threat

SmarterMSP has highlighted the recent danger of malware and ransomware coming into email boxes tied to news of the day. An example might be an email appeal for funds related to post-election legal action or rebuilding after California’s wildfires. Other...

/ November 12, 2020
The cloud-breaching headlines keep piling up

The cloud-breaching headlines keep piling up

The cloud has been victim to several high-profile breaches in recent weeks. The latest involves Pharmaceutical giant Pfizer, which suffered a significant breach of unsecured cloud data. According to Security Boulevard: The exposed data, including email addresses, home addresses, full...

/ November 5, 2020
Email threat types: Domain Impersonation

Email threat types: Domain Impersonation

Domain impersonation, also known as typosquatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate domains, such as Barracudamsp.com, by creating domains that appear similar. Such a domain might be accessed by a user typing the...

/ October 26, 2020
MSPs and election cybersecurity

MSPs and election cybersecurity

MSPs have emerged as central players in the democracy machinery. And after a rash of recent attacks on MSPs, some worry that MSPs may face a new challenge in election cybersecurity for the United States’ upcoming Presidential elections. Tim Davis,...

/ October 19, 2020
The Creeper and the Reaper make cybersecurity history

The Creeper and the Reaper make cybersecurity history

“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

/ October 16, 2020
Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”

Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”

Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...

/ October 9, 2020
Managing data sprawl

Managing data sprawl

As a managed service provider (MSP), data is one of the many things we are responsible for. However, the shift to remote working, followed by partial staff returns to the office, with the possibility of workforces heading back home again...

/ September 29, 2020