IT and Business Insights for SMB Solution Providers

Security

Article
January 18th, 2019 | Ian Thornton-Trump
Use this SMB-friendly framework to develop an incident response plan that will keep your customers ready for the inevitable. - read more
 
News
January 17th, 2019 | Rich Freeman
The new system is designed to address the challenges associated with email-based attacks that employ stolen credentials or social engineering tactics rather than malware, attachments, and malicious links to bypass traditional security safeguards. - read more
 
News
January 15th, 2019 | Rich Freeman
A new program called Goal Assist provides sales team training services, supplies expert speakers for demand generation events, offers direct help at sales meetings with potential clients, and more - read more
 
News
January 15th, 2019 | Rich Freeman
Like the vendor’s other products, the new tool is designed to be easily adopted, implemented, and supported by MSPs with limited in-house security expertise who want to enter the cybersecurity services market. - read more
 
Article
January 14th, 2019 | Rich Freeman
Our panel of IT prognosticators share their biggest predictions for 2019 and their biggest surprises from 2018. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    Researchers at Defiant Threat Intelligence Team have identified a brute force attack campaign on WordPress sites. There have been four command and control (C2) servers identified, over 14,000 proxy servers from best-proxies.ru, and over 20,000 infected WordPress sites. The attacks make XML-RPC authentication attempts against accounts. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
To help developers build and run their applications, services and integrate upcoming technologies, Microsoft has released an eBook – Learn Azure in a Month of Lunches. The eBook offers great insights into entry into cloud administration. Besides, it also gives a high-level explanation of each concept and common implementations. It breaks down the most important Azure concepts into bite-sized lessons. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    Cybersecurity professionals have known for a long time that passwords alone are not secure enough. Two-factor Authentication (2FA) has become an increasingly common way to add another layer of security. But like anything else in the security world, it is not infallible. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    Unified Extensible Firmware Interface (UEFI) rootkits gained quite a bit of attention in the security community over the years with a considerable amount of research going into the topic. However, there’s been limited practical use of this malware type in the wild until the discovery of LoJax. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised credentials, an attacker can modify the location to which an organization’s domain name resources resolve. - read more
 

Pages

Subscribe to Security