Tag: Zero Trust

insider threats
Insider threats expected to persist in 2025

Insider threats expected to persist in 2025

SmarterMSP.com recently covered the topic of insider threats, but many experts continue to point to these types of threats as one of the biggest cybersecurity challenges impacting organizations in 2025. The Hacker News, for instance, says: Insider threats are expected...

/ January 14, 2025
2024 cybersecurity
Experts look back at 2024’s cybersecurity news

Experts look back at 2024’s cybersecurity news

The year 2024 was full of cybersecurity news. It was a year of data breaches, ransomware, the rise of quantum computing, and much more. The only constant was change. As ransomware continued to wreak havoc, according to Security Intelligence, ransomware...

/ December 24, 2024
Key strategies for MSPs to improve IoT security

Key strategies for MSPs to improve IoT security

As the number of connected devices continues to rise— with the International Data Corporation (IDC) forecasting over 55 billion by 2025—managed service providers (MSPs) are facing increasing challenges to deliver security at scale. In October, SmarterMSP.com posted an article about...

/ December 17, 2024
AI BEC
The rise of AI-based BEC attacks

The rise of AI-based BEC attacks

Cybercriminals are quickly latching on to new technology and strategies to improve the success rates of their social engineering-based email attacks. In the latest Barracuda Email Threats and Trends report, the company found that although traditional email scams like phishing are...

/ November 14, 2024
Zero Trust
Easily overcome Zero Trust deployment hurdles

Easily overcome Zero Trust deployment hurdles

Zero Trust Network Access (ZTNA) isn’t just a security model — it’s the future of cybersecurity. Required in many industries today, ZTNA significantly increases the security posture across the entire organization and often replaces existing VPN solutions that have been a...

/ November 13, 2024
ransomware threat
Threat Spotlight: How ransomware for rent rules the threat landscape

Threat Spotlight: How ransomware for rent rules the threat landscape

This year’s annual review of ransomware attacks looks at the threat from two perspectives. First, for the third year running we’ve taken a global sample of reported ransomware attacks and analyzed what they tell us about ransomware attackers and their...

/ August 21, 2024
CISA
Staying cyber safe with CISA this summer

Staying cyber safe with CISA this summer

As sure as fireflies and fireworks mean summer, so do Cybersecurity and Infrastructure Security Agency (CISA) warnings and alerts. With parents shuttling kids to day camps, pool parties, and Disney World, summer is a prime time for cybercriminals to make...

/ June 10, 2024 / 7 Comments
Modern enterprises cannot rely on VPNs anymore

Modern enterprises cannot rely on VPNs anymore

Is your company depending on VPNs to access documents, files, and applications remotely? Unfortunately, legacy VPN products no longer meet the security requirements of today’s global enterprise. Many employees often proactively install commercial VPNs that are not provided or sanctioned by...

/ July 26, 2023
5 cybersecurity takeaways from 2022

5 cybersecurity takeaways from 2022

Last week we revisited some of the most significant data breaches of the year. This week, we are taking one last look at some of the other cybersecurity trends that shaped 2022. “Data breaches grab the headlines, but cybersecurity is...

/ January 5, 2023
MSPs need to lean into zero-trust IT

MSPs need to lean into zero-trust IT

There’s a lot of hype surrounding zero-trust IT as a buzzword, but at the most fundamental level it’s all about ensuring security based on a known identity of an end user, application, or device. Forrester Research analyst John Kindervag is...

/ December 14, 2022