Security

News
May 3rd, 2016 | Rich Freeman
Named Kaseya VSA 9.3, the new system features extensive automation, technician productivity, and scalability enhancements. - read more
 
News
May 3rd, 2016 | Rich Freeman
Half of surveyed organizations say they’re less vulnerable to attack now than last year, thanks to wider use of security technologies and increased training. - read more
 
Download
April 29th, 2016 | Matt Whitlock
It's here! ChannelPro Weekly episode 7 is here to provide a little food for thought - just don't feed it to the computers. Join Cecilia, Rich, and Matt as they discuss a variety of topics, like next week's ChannelPro Forum in Anaheim, why you need to be your customer's cybersecurity "Educator-in-Chief," a new case study from Scribe, and Form Factor Zombies. - read more
 
News
April 26th, 2016 | ChannelPro
Webroot SecureAnywhere Business Endpoint Protection with Global Site Manager is now available through the Tech Data Cloud Solutions Store. - read more
 
Article
April 25th, 2016 | Ron Culler
Once you understand the technologies your clients employ, you can explain how, as a team, you’ll protect their data and infrastructure. - read more
 
Article
April 25th, 2016 | Dale Tesch
IP cameras are just as vulnerable to cyber attacks as any other networked device. Here are three mandatory steps that will eliminate network security weaknesses. - read more
 
Article
April 20th, 2016 | Rich Freeman
MSPs are increasingly using network assessment services not just to get their foot in the door with new customers but to collect ongoing revenue from them as well. - read more
 
Blog Entry
April 16th, 2016 | Jay Ferron
FBI officials are warning potential victims of a dramatic rise in the business e-mail compromise scam or “B.E.C.,” a scheme that targets businesses and has resulted in massive financial losses in Phoenix and other cities.   The schemers go to great lengths to spoof company e-mail or use social engineering to assume the identity of the CEO, a company attorney, or trusted vendor. - read more
 
Blog Entry
April 16th, 2016 | Jay Ferron
As previously reported by the media in and after July 2015, security researchers evaluating automotive cybersecurity were able to demonstrate remote exploits of motor vehicles. The analysis demonstrated the researchers could gain significant control over vehicle functions remotely by exploiting wireless communications vulnerabilities. - read more
 
Blog Entry
April 16th, 2016 | Jay Ferron
Each year, criminal actors target US persons and visa holders for Stolen Identity Refund Fraud (SIRF). SIRF is defined as the fraudulent acquisition and use of the Personally Identifiable Information (PII) of US persons or visa holders to file tax returns. - read more
 

Pages

Subscribe to Security