blog

BLOG

Infamous Emotet is Back in Play

Emotet, a self-updating modular trojan horse malware, has again raised its ugly head. Emotet, also known as “The Banker,” was first discovered in 2014 as a banking Trojan. However, over...

Third-Party Integrations – Productivity vs. Risk

Although a patch alleviates the threat, a vulnerability dubbed GhostToken reveals the danger of installing third-party integrations into sanctioned apps. GhostToken allowed attackers irrevocable...

Onboarding – A White Glove Experience

You’re investigating a new tool and it appears to solve all the problems you’ve been facing. The value justifies the cost, but you just can’t seem to pull the trigger. Why? You don’t have the time or...

EDR v. Threat Hunting v. Endpoint Protection

It seems like everyone you speak with has their favorite tool –  EDR v. threat hunting v. endpoint protection. Unfortunately, this often leads to relying on one tool while ignoring the others...

Is Your EDR Vulnerable?

Recently, cybersecurity experts reported that many EDRs are vulnerable to an attack that takes advantage of the “delete after reboot” command to maliciously wipe data.  Endpoint security solutions...

Correlation, Causation, or Checking Boxes

“I need a SIEM. I need a SOAR.” These are requests we field everyday from MSPs. Our first question is always, “What are you looking to accomplish?” Unfortunately, the vast...

IRaaS is a Step Backward for the Channel

Over two decades ago, the IT industry began to shift from break-fix to managed services. Savvy business owners on both sides of the equation recognized that it made a lot more sense to have...

Get on the YOLO Bus AKA Find Work-Life Balance

Friday, March 4, was the National Day of Unplugging. This begs the question, when did you last really unplug? Some companies took the day off Friday, as a mandatory day to relax; but we’re willing to...

Top 3 Cybersecurity Mistakes MSPs Make

Working with MSPs every day, we see a lot of cybersecurity mistakes. In fact, preventing these mistakes is the whole reason for BLOKWORX existence. These are the top 3 cybersecurity mistakes we see...