
BLOG
As we now turn the corner into the new year, it’s time to assess goals surrounding your cybersecurity posture. Dare we say it – you need to set your cyber resolutions for 2022. Unlike...
Don’t Let Your Client Be Next. Why the Kaseya Ransomware Attack Is a Story About Onions The Kaseya Attack Reminds Us That Cybersecurity is About Layers When it Comes to MSPs, Prevention Eats Recovery...
Data breaches and cybersecurity incidents present significant challenges for today’s businesses and MSPs. Not only are the recovery costs extensive – nearly $4 Million according to IBM’s...
Adobe continues to work at a feverish pace to address critical security vulnerabilities in its product line. Their most recent patch addresses a total of ten security flaws across the following four...
Back in February, Google began experimenting with a new feature that defaulted all URLs to use “https:” rather than the less secure “http:.” While defaulting to the secure...
The Microsoft 365 Defender Threat Intelligence Team recently issued a dire warning that every IT professional should take seriously. They’ve discovered an emerging threat in the form of hackers...
Scammers have found a new way to take advantage of people, so be on your guard. The U.S. Department of Justice has recently issued an alert warning people of fake emails sent out asking recipients to...
There’s a new cryptomining worm threat to be aware of, and it’s making the lives of IT Administrators who manage Windows and Linux environments nightmarish. This news comes from a recently...
A March 2021 report found that 31 billion data records were compromised in 2020, a number that dwarfs the total of the past 15 years combined. As tactics from phishing scams to ransomware attacks...