blog

BLOG

Vulnerability Scanning vs. Penetration Testing: What’s the difference and what do you need?

MSPs approach us frequently requesting a penetration test for themselves or a new client. Most often though, we determine that they don’t want a penetration test at all. They really need a...

Five Cybersecurity Resolutions for your MSP

As we now turn the corner into the new year, it’s time to assess goals surrounding your cybersecurity posture. Dare we say it – you need to set your cyber resolutions for 2022. Unlike...

2019 was ScreenConnect. 2020 was Solar Winds. 2021 is Kaseya.

Don’t Let Your Client Be Next. Why the Kaseya Ransomware Attack Is a Story About Onions The Kaseya Attack Reminds Us That Cybersecurity is About Layers When it Comes to MSPs, Prevention Eats Recovery...

What does the SOC Do? And How is Different Than the NOC?

Data breaches and cybersecurity incidents present significant challenges for today’s businesses and MSPs. Not only are the recovery costs extensive – nearly $4 Million according to IBM’s...

Update Adobe Now For Several Critical Security Updates

Adobe continues to work at a feverish pace to address critical security vulnerabilities in its product line. Their most recent patch addresses a total of ten security flaws across the following four...

Security Is Top Priority In Latest Chrome Build

Back in February, Google began experimenting with a new feature that defaulted all URLs to use “https:” rather than the less secure “http:.” While defaulting to the secure...

Hackers Are Using Legitimate Google Services To Wreak Havoc

The Microsoft 365 Defender Threat Intelligence Team recently issued a dire warning that every IT professional should take seriously. They’ve discovered an emerging threat in the form of hackers...

Watch Out For Vaccine Survey Phishing Emails

Scammers have found a new way to take advantage of people, so be on your guard. The U.S. Department of Justice has recently issued an alert warning people of fake emails sent out asking recipients to...

Cryptomining Worm Botnet Seeking And Attacking Vulnerable Devices

There’s a new cryptomining worm threat to be aware of, and it’s making the lives of IT Administrators who manage Windows and Linux environments nightmarish. This news comes from a recently...