Onboarding – A White Glove Experience

You’re investigating a new tool and it appears to solve all the problems you’ve been facing. The value justifies the cost, but you just can’t seem to pull the trigger. Why? You don’t have the time or the resource needed to dedicate to the onboarding effort, and we all know that onboarding is one of […]
EDR v. Threat Hunting v. Endpoint Protection

It seems like everyone you speak with has their favorite tool – EDR v. threat hunting v. endpoint protection. Unfortunately, this often leads to relying on one tool while ignoring the others, and other times conflating one tool’s capabilities into another. Realistically, EDR, threat hunting, and endpoint protection are all important for security. Why? Because […]
Is Your EDR Vulnerable?

Recently, cybersecurity experts reported that many EDRs are vulnerable to an attack that takes advantage of the “delete after reboot” command to maliciously wipe data. Endpoint security solutions traditionally use this feature to force a reboot and delete malicious files. Malicious actors have now weaponized the feature to delete important, and otherwise, uncompromised data. Even […]
Correlation, Causation, or Checking Boxes

“I need a SIEM. I need a SOAR.” These are requests we field everyday from MSPs. Our first question is always, “What are you looking to accomplish?” Unfortunately, the vast majority of the time the answer is, “I’m filling out an insurance form, and it says that in order to be eligible for cyber insurance, […]
IRaaS is a Step Backward for the Channel

Over two decades ago, the IT industry began to shift from break-fix to managed services. Savvy business owners on both sides of the equation recognized that it made a lot more sense to have predictable expenses dedicated to IT services rather than wait for something to break and rack up unknown costs fixing the issue. […]
Get on the YOLO Bus AKA Find Work-Life Balance

Friday, March 4, was the National Day of Unplugging. This begs the question, when did you last really unplug? Some companies took the day off Friday, as a mandatory day to relax; but we’re willing to bet you weren’t one of them. As an IT company, you’re required to be present 24/7/365. Unfortunately, this is […]
Top 3 Cybersecurity Mistakes MSPs Make

Working with MSPs every day, we see a lot of cybersecurity mistakes. In fact, preventing these mistakes is the whole reason for BLOKWORX existence. These are the top 3 cybersecurity mistakes we see MSPs make every day. 1. Paying for a Service and Not Fully Deploying It We recently got an escalated support ticket from […]
Vulnerability Scanning vs. Penetration Testing: What’s the difference and what do you need?

MSPs approach us frequently requesting a penetration test for themselves or a new client. Most often though, we determine that they don’t want a penetration test at all. They really need a vulnerability scan. What’s the difference and how do we help our clients see the light? Passive vs. Offensive – Vulnerability Scan vs. Penetration […]
Five Cybersecurity Resolutions for your MSP

As we now turn the corner into the new year, it’s time to assess goals surrounding your cybersecurity posture. Dare we say it – you need to set your cyber resolutions for 2022. Unlike traditional pie in the sky resolutions that fall flat before February hits (cough* cough* gym memberships), if you work your way […]
2019 was ScreenConnect. 2020 was Solar Winds. 2021 is Kaseya.
Don’t Let Your Client Be Next. Why the Kaseya Ransomware Attack Is a Story About Onions The Kaseya Attack Reminds Us That Cybersecurity is About Layers When it Comes to MSPs, Prevention Eats Recovery for Breakfast The Kaseya Ransomware Attack Could Have Happened to Anyone They say the best offense is a good defense. But […]
What does the SOC Do? And How is Different Than the NOC?
Data breaches and cybersecurity incidents present significant challenges for today’s businesses and MSPs. Not only are the recovery costs extensive – nearly $4 Million according to IBM’s most recent analysis – but consumers and regulators are increasingly punishing companies that can’t protect their data or infrastructure. As a result, many business leaders view cybersecurity as […]
Update Adobe Now For Several Critical Security Updates
Adobe continues to work at a feverish pace to address critical security vulnerabilities in its product line. Their most recent patch addresses a total of ten security flaws across the following four products: Photoshop Adobe Digital Editions Adobe Bridge RoboHelp Of the ten flaws addressed by the latest patch, seven are rated as being Critical […]