Tag: Security

Can malware physically damage a computer?

Can malware physically damage a computer?

The idea that a computer virus could damage hardware is something that has plagued the cyber community. Some of the more sensational stories out there suggest that it’s possible to send a bomb via email. I stumbled upon this article,...

/ December 19, 2018 / 2 Comments
Five MSP security predictions for 2019

Five MSP security predictions for 2019

The champagne hasn’t been purchased, the noisemakers are still in storage, and the ball in Times Square hasn’t fallen to usher in 2019 yet. The ball is operated and dropped using a computer network, one that we hope is well...

/ December 12, 2018
MSPs should plan now for a better IoT tomorrow

MSPs should plan now for a better IoT tomorrow

While it’s still early days as far as the Internet of Things (IoT) market opportunity is concerned, a new survey suggests the opportunity surrounding IoT could be massive. A global survey of 700 organizations conducted by ReRez Research on behalf...

/ December 6, 2018 / 3 Comments
8 MSP security trends that emerged in 2018

8 MSP security trends that emerged in 2018

For MSPs, 2018 was anything but a dull year. Change is constant in the world of cybersecurity and the year delivered on that truism in spades. Before 2018 slips into the rearview mirror, let’s look back at some of the...

/ December 5, 2018
Overcoming obstacles with selling security

Overcoming obstacles with selling security

From “Insecure platforms are a threat to your business!” and “There are millions of malicious people trying to break into your systems!” to “State-sponsored security attacks are a threat to you!”, the “Chicken Little” approaches to selling security never seem...

/ November 19, 2018 / 2 Comments
MSPs are good medicine for hospitals

MSPs are good medicine for hospitals

Imagine a senior government official with a pacemaker and the chilling scenarios that could play out if a hacker could overcome this device’s defenses. It sounds like something ripped out of a movie script, but it’s slowly creeping closer to...

/ October 15, 2018
The pros and cons of biometrics

The pros and cons of biometrics

A new malware targeting banking customers in Brazil calls into question the security of biometric account protections. Interestingly, the sophisticated attack – dubbed as CamuBot, uses very low-tech, retro ways to target its victims. CamuBot was recently described in ThreatPost...

/ October 3, 2018
Today’s hackers are definitely not your father’s hackers

Today’s hackers are definitely not your father’s hackers

There was once a hacker stereotype — the prototype was a pimply-faced teenage boy living in his parent’s basement in some nondescript suburb. His end goal was proving he could get into your network and show off his bonafides to...

/ September 4, 2018 / 2 Comments
BYODs and MSPs: Security headache or harmless convenience?

BYODs and MSPs: Security headache or harmless convenience?

BYOD. Sounds like something you’d see scrawled on an invitation to a party. Actually, if you attend the parties I do, “Bring Your Own Device” would be accurate. Nowadays, everyone sits around and scrolls on their devices. If someone does...

/ August 2, 2018
How Google neutralized phishing attacks and what you can learn from them

How Google neutralized phishing attacks and what you can learn from them

Google announced a remarkable achievement this week — not one of its 85,000 employees has been the victim of a phishing attack since the beginning of 2017. Phishing refers to when a hacker sends an email that looks authentic for...

/ July 24, 2018