BLOG
MSPs approach us frequently requesting a penetration test for themselves or a new client. Most often though, we determine that they don’t want a penetration test at all. They really need a...
As we now turn the corner into the new year, it’s time to assess goals surrounding your cybersecurity posture. Dare we say it – you need to set your cyber resolutions for 2022. Unlike...
Don’t Let Your Client Be Next. Why the Kaseya Ransomware Attack Is a Story About Onions The Kaseya Attack Reminds Us That Cybersecurity is About Layers When it Comes to MSPs, Prevention Eats Recovery...
Data breaches and cybersecurity incidents present significant challenges for today’s businesses and MSPs. Not only are the recovery costs extensive – nearly $4 Million according to IBM’s...
Adobe continues to work at a feverish pace to address critical security vulnerabilities in its product line. Their most recent patch addresses a total of ten security flaws across the following four...
Back in February, Google began experimenting with a new feature that defaulted all URLs to use “https:” rather than the less secure “http:.” While defaulting to the secure...
The Microsoft 365 Defender Threat Intelligence Team recently issued a dire warning that every IT professional should take seriously. They’ve discovered an emerging threat in the form of hackers...
Scammers have found a new way to take advantage of people, so be on your guard. The U.S. Department of Justice has recently issued an alert warning people of fake emails sent out asking recipients to...
There’s a new cryptomining worm threat to be aware of, and it’s making the lives of IT Administrators who manage Windows and Linux environments nightmarish. This news comes from a recently...