IT and Business Insights for SMB Solution Providers

Tips and Advice

Article
January 21st, 2019 | Chris Hoose
By stepping out of the back office and taking a more public role as a leader, Choose Networks’ founder is driving business engagement and growth. - read more
 
Article
January 15th, 2019 | David Wilkeson
Offering meaningful incentives that align with your business goals is a win-win for you and your employees. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    Researchers at Defiant Threat Intelligence Team have identified a brute force attack campaign on WordPress sites. There have been four command and control (C2) servers identified, over 14,000 proxy servers from best-proxies.ru, and over 20,000 infected WordPress sites. The attacks make XML-RPC authentication attempts against accounts. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
To help developers build and run their applications, services and integrate upcoming technologies, Microsoft has released an eBook – Learn Azure in a Month of Lunches. The eBook offers great insights into entry into cloud administration. Besides, it also gives a high-level explanation of each concept and common implementations. It breaks down the most important Azure concepts into bite-sized lessons. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    Cybersecurity professionals have known for a long time that passwords alone are not secure enough. Two-factor Authentication (2FA) has become an increasingly common way to add another layer of security. But like anything else in the security world, it is not infallible. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    Unified Extensible Firmware Interface (UEFI) rootkits gained quite a bit of attention in the security community over the years with a considerable amount of research going into the topic. However, there’s been limited practical use of this malware type in the wild until the discovery of LoJax. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
The National Cybersecurity and Communications Integration Center (NCCIC), part of the Cybersecurity and Infrastructure Security Agency (CISA), is aware of a global Domain Name System (DNS) infrastructure hijacking campaign. Using compromised credentials, an attacker can modify the location to which an organization’s domain name resources resolve. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    The group behind the CryptoMix malware have changed tactics once again. The bad actors in this case brute force a login through RDP, and then encrypt the data on your computer while attempting to identify and remove any local backups available. With a successful attack, there’s no way to regain your data without the decryption key or through an off-network backup of the system. - read more
 
Blog Entry
January 12th, 2019 | Jay Ferron
    A hacker called SandboxEscaper disclosed an unpatched zero-day exploit affecting the Windows® operating system. This is the third zero-day exploit SandboxEscaper has disclosed in the last six months. - read more
 
Article
January 9th, 2019 | Diane Conaway
Successful SAM programs require people and time. Turning that over to an experienced MSP with established processes can help ensure maximum ROI and reduced risk. - read more
 

Pages

Subscribe to Tips and Advice