If you run a small business (or even a large one), you probably spend a significant amount of time thinking about how to protect yourself from cyberattacks.
It was not that long ago that a thought leader had to earn their reputation. These days, just about anyone can set themselves up as a thought leader and share their opinions on a global platform.
They need not have experience or expertise. They just require the ability to market themselves effectively to a wide audience. This helps to seal their reputation and reach “influencer” status. Continue reading
In the mid-1970s, when I was working in the Navy’s new cybersecurity group, we had it easy.
Not that we felt like that, of course. Automation was still pretty primitive, and encrypting messages often took hours (if not days). But looking back, we had one huge advantage over the cybersecurity engineers of today: we didn't let anyone touch our equipment. Everyone had to go through us to send messages and protect data, and so we could make sure that this was done correctly. Continue reading
News broke last April, at the height of the pandemic fears, that Google, Apple, and MIT were working together to build a smartphone app that would conduct contact tracing much faster and more efficiently than the old way of hiring humans to do the same thing. Continue reading
There’s an ancient Chinese curse that goes something like this: may you live in interesting times. To be perfectly honest, I’m hoping that these “interesting” times return to normal sometime soon. Continue reading
There’s nothing new or especially significant about the remote work concept. Students and employees have been doing it in increasing numbers over the past decade. What changed the game was the recent immediate mass exodus from workplaces and classrooms to home offices or even the living room table as a result of the COVID-19 pandemic. Continue reading
If you are an MSP or use the services of one, you should be aware that the level of cyberthreat for MSPs has increased dramatically over the last year.
As we’ve previously pointed out, the range of threat vectors faced by the average MSP is now huge, from social engineering attacks to cryptojacking, alongside the ever-present threat of phishing. Continue reading
As the cybersecurity market grows, it has become increasingly difficult for managed service providers to assess the value of third-party vendors. Typically, MSPs must now assess hundreds of different products, even within a fair niche product category, and each with different features and price points. In this article, we’ll take a look at a basic set of practices for assessing different cybersecurity vendors for MSPs, and show you how to get the most out of your interactions with them. Continue reading
Sometimes, it can feel as if half the job of running an MSP is working as an unpaid cybersecurity consultant to clients. Speak to anyone in the industry, and they can tell you scary stories about clients who wanted passwords disabled, encryption “turned off”, or backups “made invisible”. Continue reading
Cloud services are shaking up every industry on a global scale. From mid-market to large organizations, the cloud’s popularity is gaining, due to big data, privacy concerns, and other safety and security issues.