Tag: network security

Barracuda CloudGen Firewall’s work-from-home capabilities

Barracuda CloudGen Firewall’s work-from-home capabilities

Barracuda solutions have long been engineered to support distributed workloads and mobile workforces. We fully embraced the changing nature of work a few years ago when we launched our Barracuda CloudGen Firewall (CGF). The Barracuda CGF took firewalls to the...

/ March 17, 2020
8 Surprising cybersecurity stats to share with customers

8 Surprising cybersecurity stats to share with customers

Starting security conversations with your customers isn’t always easy. All too often, customers will tell you that they don’t have time, that they aren’t large enough to be targeted by an attack, or even worse, they think they’ve already ‘checked...

/ October 23, 2019
MSP provides comprehensive network and email security

MSP provides comprehensive network and email security

NoctisIT has been serving the Austin, Texas area since 2013, providing technical help desk support, computer support, and consulting services to small and mid-size businesses. The service provider’s security expertise has contributed to its demand, not only in protecting highly...

/ October 3, 2019 / 1 Comment
Are IoT devices serious security threats?

Are IoT devices serious security threats?

IoT is transforming offices, campuses, and factories, but also brings warnings that the cloud-connected security camera monitoring the storage room could be a threat. How realistic are these warnings, and how much is hyperbole? For answers, Smarter MSP checked in...

/ September 4, 2019
When throttling is acceptable

When throttling is acceptable

I have previously written about how important it is to be flexible with customers, allowing the occasional traffic burst to go unnoticed – well, at least as far as the invoice is concerned. The problem is when that traffic burst...

/ September 2, 2019
MSPs are being used to breach their customers’ networks

MSPs are being used to breach their customers’ networks

Hackers will probe for whatever weak links they can find to breach an enterprise’s network. However, what if the weak link is you, the MSP? The scenario of an MSP as system’s victim instead of the protector is increasingly playing...

/ July 10, 2019
The healthcare slice of the MSP pie continues to grow

The healthcare slice of the MSP pie continues to grow

For the second year in a row, the top security niche that MSPs are focusing in on, is the healthcare industry. As hospitals expand and medical wearables are becoming more common, organizations with skeletal IT staffs are looking more and...

/ June 19, 2019
Cryptojacking is making a comeback

Cryptojacking is making a comeback

Black Squid has washed up on the cyber-shores of the United States, after first being spotted in Thailand. Unlike its oceanic counterparts, this cyber squid is destructive. Beincrypto describes the threat like this: It uses tactics such as anti-virtualization, anti-debugging,...

/ June 12, 2019
Tech Time Warp: Prince Philip’s inbox gets hacked

Tech Time Warp: Prince Philip’s inbox gets hacked

Harry and Meghan might grab headlines for their privacy settlements and use of social media, but the younger royals are hardly breaking new ground. You might say they’re just following in the family’s footsteps. In 1985, two hackers were arrested...

/ May 24, 2019
Catch hackers with a honeypot in your security service

Catch hackers with a honeypot in your security service

I once visited an Amish farm where green plastic 2-liter 7-Up bottles dangled from the lower branches of the fruit trees. The bottles were filled about halfway with some sort of liquid. Upon closer inspection, I could see a banana peel...

/ May 15, 2019