Latest posts

Change layout
Working Remotely COVID-19 Raises the Standard for VPN Security

Working Remotely: COVID-19 Raises the Standard for VPN Security

Working Remotely: COVID-19 Raises the Standard for VPN Security

There’s nothing new or especially significant about the remote work concept. Students and employees have been doing it in increasing numbers over the past decade. What changed the game was the recent immediate mass exodus from workplaces and classrooms to home offices or even the living room table as a result of the COVID-19 pandemic.  Continue reading

Cybersecurity article header

Takeaways From 2019 Ransomware Attacks on MSPs

Takeaways From 2019 Ransomware Attacks on MSPs

If you are an MSP or use the services of one, you should be aware that the level of cyberthreat for MSPs has increased dramatically over the last year.

As we’ve previously pointed out, the range of threat vectors faced by the average MSP is now huge, from social engineering attacks to cryptojacking, alongside the ever-present threat of phishing. Continue reading

The MSP’s Guide To Vetting Cybersecurity Vendors

The MSP’s Guide To Vetting Cybersecurity Vendors

The MSP’s Guide To Vetting Cybersecurity Vendors

As the cybersecurity market grows, it has become increasingly difficult for managed service providers to assess the value of third-party vendors. Typically, MSPs must now assess hundreds of different products, even within a fair niche product category, and each with different features and price points. In this article, we’ll take a look at a basic set of practices for assessing different cybersecurity vendors for MSPs, and show you how to get the most out of your interactions with them. Continue reading

5 Common Misconceptions MSPs Have About Data Security

5 Common Misconceptions MSPs Have About Data Security

5 Common Misconceptions MSPs Have About Data Security

Sometimes, it can feel as if half the job of running an MSP is working as an unpaid cybersecurity consultant to clients. Speak to anyone in the industry, and they can tell you scary stories about clients who wanted passwords disabled, encryption “turned off”, or backups “made invisible”. Continue reading

How MSPs Offer Cloud Implementation to Customers

How MSPs Offer Cloud Implementation to Customers

How MSPs Offer Cloud Implementation to Customers

Cloud services are shaking up every industry on a global scale. From mid-market to large organizations, the cloud’s popularity is gaining, due to big data, privacy concerns, and other safety and security issues.

According to a recent study by Gartner, the public cloud services market will grow another 17 percent in 2020, reaching $266.4 billion, and this growth is picking up speed. Continue reading

MSSP Software Stack

Data Backup Security Considerations for MSPs

Data Backup Security Considerations for MSPs

Managing one server can be complicated enough, but what if you have multiple platforms to protect? Multi-server platforms are more common as we transition to an environment of highly distributed, cloud-based platforms. As we move further, multi-tenancy is becoming the new black when it comes to digital ecosystems. Continue reading

5 Critical Cybersecurity Tips for SMBs in 2019

5 Critical Cybersecurity Tips for SMBs in 2024

5 Critical Cybersecurity Tips for SMBs in 2024

If you run a small business, you might not think that you are a priority target for hackers. But you'd be wrong.

Small and Medium-Sized Businesses (SMBs) are among the most frequent target for cyber attacks. Even the smallest business holds a wealth of personal information on customers, employees, and other businesses. In addition, SMBs are at greater risk for cyber attacks because they tend to be easier targets, and don’t always have the resources that larger organizations can deploy to protect themselves. Continue reading

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

How To Detect and Defend Against Triton Malware

Cyber attacks aimed at breaking through network monitoring defenses and raiding Industrial Control Systems (ICS) and mangling the Industrial Internet of Things (IIoT) is nothing new.

These kinds of attacks have been around since the first company website was launched. From stealing data to altering information to shutting down software and hardware, the threats are there and growing more sophisticated every day. Continue reading

VPN data leaks protection

How to Check Your VPN for Data Leaks

How to Check Your VPN for Data Leaks

Just a few short years ago, virtual private networks (VPNs) were a novel technology to the masses. The advanced security and anonymity they offered were only for paranoids and dissidents. Fast forward to today’s internet with its daily headlines of massive data breaches, government snooping, and a Dark Web with an endless appetite for your personal information. Continue reading