The majority of IT service providers (ITSPs) are doing an outstanding job delivering security solutions to their customers. However, as the saying goes: “The cobbler’s children have no shoes.” There may be no better example of this than how service providers are implementing password security and technician access management for the hundreds or thousands of […]
Throughout the past year, our inboxes and RSS feeds have been flooded with news about malware and ransomware. But what about phlashing attacks? Phlashing attacks have been designed by hackers with one sole purpose: to infect and permanently damage — or “brick” — a device. More specifically, phlashing attacks are targeting Internet of Things (IoT) […]
As more information unfolds about the Yahoo data breach, it all comes down to a single fact: the entire breach was enabled by just one click on a spear phishing link.
Thanks to hard-won experience, most managed service providers (MSPs) have an IT incident response plan in place to cope with any disruption to their business. In contrast, however, it turns out most internal IT organizations don’t. At a time when distributed denial of service (DDoS) and ransomware attacks are making it apparent just how weak […]
It’s becoming more and more commonplace to read headlines reporting the latest and “greatest” security breach affecting a major corporation. Target, Home Depot, Anthem, and even the United States government have all been affected by cybercriminals hacking into their system and exploiting their sensitive information. While these attacks are becoming more frequent, they’re also becoming […]