This report comprised of statistics pulled from a survey of 1,400+ managed service providers (MSPs), our partners, and clients, around the world to provide unique visibility into the state of ransomware from the perspective of the IT Channel.
Live from Santa Barbara, Calif., Erick and Rich discuss Auvik’s plans to add IoT device detection to its network management solution, why upgrading your personal network (of friends) can help you achieve your goals, and some new playlists from Spotify…for your pets.
Erick and Rich are back from the holidays and raring to dive back into hot topics like Veeam’s $5 billion private equity deal, the importance of having a unique value proposition, and the dangers of tweeting about the lame Christmas gift your boss gave you.
With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.
I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.
National Cyber Awareness System: Safeguard Websites from Cyberattacks (REPOST) Original release date: January 21, 2020Protect personal and organizational public-facing websites from defacement, data breaches, and other types of cyberattacks by following cybersecurity best practices. The - Read More
Critical Patch Update is a collection of patches for multiple security vulnerabilities. These patches are usually cumulative, but each advisory describes only the security patches added since the previous Critical Patch Update advisory. Thus, prior Critical Patch Update advisories should be - Read More
Cisco has released security updates to address vulnerabilities in Cisco Webex Video Mesh, Cisco IOS, and Cisco IOS XE Software. A remote attacker could exploit these vulnerabilities to take control of an affected system. For updates addressing lower severity vulnerabilities, see the Cisco Security - Read More
With an estimated 25,000 hosts still vulnerable and proof-of-concept (PoC) exploit code now being released, things went from bad to worse for those affected by the vulnerability CVE-2019-19881. In December, Mikhail Klyuchnikov, a researcher at Positive Technologies disclosed a - Read More
A popular app allowing parents to track their baby’s special moments by storing videos, pictures, height, weight, location, and other milestones in a child’s development has leaked thousands of those special moments online. Peekaboo Moments, developed by Bithouse Inc - Read More
In the first three quarters of 2019, the world saw nearly 152 million ransom-ware attacks affecting every sector from government to education to healthcare. As the threat continues to grow, it costs businesses over $75 million per year. One cybersecurity group estimated a new - Read More
WhatsApp is a Facebook owned messaging system popular for their end-to-end encryption and groups that are capable of including up to 256 members. A shared communication tool is critical to have while coordinating amongst friends and participants of collaborative efforts. When one - Read More
In the world of IoT home cameras, Ring cameras by Amazon are most popular. There can be many benefits of using the cameras for monitoring or as a security device, but it’s been a bad few weeks for the Ring camera. We now have reports of a hacker taunting a child in - Read More
Malicious apps are bad enough, but what if you have one on your phone that looks just like an app you use everyday? As it turns out, researchers from the Norwegian application security firm Promon discovered an Android vulnerability that does just that. - Read More
A virtual private network (VPN) is supposed to keep the user's traffic over a network safe from outside onlookers. They act as a protected path for communication over a public network to gain access to the resources and capabilities of the private network without a physical connection. Researchers - Read More