BLOG
IRaaS is a Step Backward for the Channel
Over two decades ago, the IT industry began to shift from break-fix to managed services. Savvy business owners on both sides of the equation recognized that it made a lot […]
Get on the YOLO Bus AKA Find Work-Life Balance
Friday, March 4, was the National Day of Unplugging. This begs the question, when did you last really unplug? Some companies took the day off Friday, as a mandatory day […]
Top 3 Cybersecurity Mistakes MSPs Make
Working with MSPs every day, we see a lot of cybersecurity mistakes. In fact, preventing these mistakes is the whole reason for BLOKWORX existence. These are the top 3 cybersecurity […]
Vulnerability Scanning vs. Penetration Testing: What’s the difference and what do you need?
MSPs approach us frequently requesting a penetration test for themselves or a new client. Most often though, we determine that they don’t want a penetration test at all. They really […]
Five Cybersecurity Resolutions for your MSP
As we now turn the corner into the new year, it’s time to assess goals surrounding your cybersecurity posture. Dare we say it – you need to set your cyber […]
2019 was ScreenConnect. 2020 was Solar Winds. 2021 is Kaseya.
Don’t Let Your Client Be Next. Why the Kaseya Ransomware Attack Is a Story About Onions The Kaseya Attack Reminds Us That Cybersecurity is About Layers When it Comes to […]
What does the SOC Do? And How is Different Than the NOC?
Data breaches and cybersecurity incidents present significant challenges for today’s businesses and MSPs. Not only are the recovery costs extensive – nearly $4 Million according to IBM’s most recent analysis […]
Update Adobe Now For Several Critical Security Updates
Adobe continues to work at a feverish pace to address critical security vulnerabilities in its product line. Their most recent patch addresses a total of ten security flaws across the […]
Security Is Top Priority In Latest Chrome Build
Back in February, Google began experimenting with a new feature that defaulted all URLs to use “https:” rather than the less secure “http:.” While defaulting to the secure socket layer […]
Hackers Are Using Legitimate Google Services To Wreak Havoc
The Microsoft 365 Defender Threat Intelligence Team recently issued a dire warning that every IT professional should take seriously. They’ve discovered an emerging threat in the form of hackers utilizing […]
Watch Out For Vaccine Survey Phishing Emails
Scammers have found a new way to take advantage of people, so be on your guard. The U.S. Department of Justice has recently issued an alert warning people of fake […]
Cryptomining Worm Botnet Seeking And Attacking Vulnerable Devices
There’s a new cryptomining worm threat to be aware of, and it’s making the lives of IT Administrators who manage Windows and Linux environments nightmarish. This news comes from a […]
GET THE SITUATION REPORT
Stay informed about the latest in cybersecurity. Subscribe to The Situation Report to get the information you need to keep your business safe and your data secure.