Tag: Security
Beware of Google Chrome complacency
Google Chrome is about as common in office spaces as a water cooler or a coffeemaker. Chrome is also becoming king elsewhere, unless the systems are Macs, and Safari is the browser of choice. With its minimalist, crisp interface and...
Tech Time Warp: The origins of the Cult of the Dead Cow
The high plains of Lubbock, Texas—a conservative, church-going area of the country to be sure—are not where you would expect a group of “hacktivists” to have gotten its start, let alone the group that coined the term “hacktivism.” But the...
Hybrid remains dominant approach to cloud computing
A global survey of 256 IT and security professionals conducted by the Cloud Security Alliance (CSA) finds just shy of two-thirds of respondents (61 percent) are employing some form of hybrid cloud computing.
Survey surfaces increased reliance on MSPs
A recent survey of 1,000 IT decision-makers from small and mid-sized enterprises (SMEs) across a variety of industries conducted by JumpCloud, a directory platform provider, suggests that managed service providers (MSPs) are now accounting for a much larger share of...
Partner Spotlight: How one MSP reduced phishing-related calls by 20 percent
Based in Toronto, Tuor Networks is an IT managed services provider (MSP) serving customers nationally across Canada. The company provides comprehensive solutions in IT infrastructure, cloud, and outsourced IT managed services to small, medium and large businesses across a variety...
Ask an MSP Expert: How do we protect our healthcare clients’ data?
Q: We have a growing number of healthcare clients. Maintaining their security used to be not that much different from our other customers, but with the explosion of IoT, there are so many more threats that they are susceptible to....
How to take a security-centric approach with your RMM
Q: We recognize that cybersecurity needs to be a priority for our MSP. How can we use the tools we have — or similar tools — to recognize vulnerabilities and anomalies in our customers’ network? Cybercriminals are very good at...
Long road to achieving GDPR compliance still lies ahead
A survey of 1,263 IT professionals conducted by the Ponemon Institute, on behalf of the law firm McDermott Will & Emery LLP, suggests that even some of the best laid plans to comply with the General Data Protection Rule (GDPR)...
MSPs can protect self-driving cars and their passengers
Autonomous vehicles are here to stay, and MSPs have a significant opportunity to become guardians of their security. Many MSPs already have industrial accounts, and that is where the most significant advances are occurring. A survey last year showed that...
Human vulnerability is the biggest cybersecurity threat
The culture of cybersecurity has been training its weapons in the wrong direction, according to Dr. Arun Vishwanath, the chief technologist at Avant Research Group and a former professor at the University at Buffalo. While ransomware, spearphishers, and general hackers...