Tag: Security
Can malware physically damage a computer?
The idea that a computer virus could damage hardware is something that has plagued the cyber community. Some of the more sensational stories out there suggest that it’s possible to send a bomb via email. I stumbled upon this article,...
Five MSP security predictions for 2019
The champagne hasn’t been purchased, the noisemakers are still in storage, and the ball in Times Square hasn’t fallen to usher in 2019 yet. The ball is operated and dropped using a computer network, one that we hope is well...
MSPs should plan now for a better IoT tomorrow
While it’s still early days as far as the Internet of Things (IoT) market opportunity is concerned, a new survey suggests the opportunity surrounding IoT could be massive. A global survey of 700 organizations conducted by ReRez Research on behalf...
8 MSP security trends that emerged in 2018
For MSPs, 2018 was anything but a dull year. Change is constant in the world of cybersecurity and the year delivered on that truism in spades. Before 2018 slips into the rearview mirror, let’s look back at some of the...
Overcoming obstacles with selling security
From “Insecure platforms are a threat to your business!” and “There are millions of malicious people trying to break into your systems!” to “State-sponsored security attacks are a threat to you!”, the “Chicken Little” approaches to selling security never seem...
MSPs are good medicine for hospitals
Imagine a senior government official with a pacemaker and the chilling scenarios that could play out if a hacker could overcome this device’s defenses. It sounds like something ripped out of a movie script, but it’s slowly creeping closer to...
The pros and cons of biometrics
A new malware targeting banking customers in Brazil calls into question the security of biometric account protections. Interestingly, the sophisticated attack – dubbed as CamuBot, uses very low-tech, retro ways to target its victims. CamuBot was recently described in ThreatPost...
Today’s hackers are definitely not your father’s hackers
There was once a hacker stereotype — the prototype was a pimply-faced teenage boy living in his parent’s basement in some nondescript suburb. His end goal was proving he could get into your network and show off his bonafides to...
BYODs and MSPs: Security headache or harmless convenience?
BYOD. Sounds like something you’d see scrawled on an invitation to a party. Actually, if you attend the parties I do, “Bring Your Own Device” would be accurate. Nowadays, everyone sits around and scrolls on their devices. If someone does...
How Google neutralized phishing attacks and what you can learn from them
Google announced a remarkable achievement this week — not one of its 85,000 employees has been the victim of a phishing attack since the beginning of 2017. Phishing refers to when a hacker sends an email that looks authentic for...