BLOG

Vulnerability Scanning vs. Penetration Testing: What’s the difference and what do you need?

MSPs approach us frequently requesting a penetration test for themselves or a new client. Most often though, we determine that they don’t want a penetration test at all. They really […]

Five Cybersecurity Resolutions for your MSP

As we now turn the corner into the new year, it’s time to assess goals surrounding your cybersecurity posture. Dare we say it – you need to set your cyber […]

2019 was ScreenConnect. 2020 was Solar Winds. 2021 is Kaseya.

Don’t Let Your Client Be Next. Why the Kaseya Ransomware Attack Is a Story About Onions The Kaseya Attack Reminds Us That Cybersecurity is About Layers When it Comes to […]

What does the SOC Do? And How is Different Than the NOC?

Data breaches and cybersecurity incidents present significant challenges for today’s businesses and MSPs. Not only are the recovery costs extensive – nearly $4 Million according to IBM’s most recent analysis […]

Update Adobe Now For Several Critical Security Updates

Adobe continues to work at a feverish pace to address critical security vulnerabilities in its product line. Their most recent patch addresses a total of ten security flaws across the […]

Security Is Top Priority In Latest Chrome Build

Back in February, Google began experimenting with a new feature that defaulted all URLs to use “https:” rather than the less secure “http:.” While defaulting to the secure socket layer […]

Hackers Are Using Legitimate Google Services To Wreak Havoc

The Microsoft 365 Defender Threat Intelligence Team recently issued a dire warning that every IT professional should take seriously. They’ve discovered an emerging threat in the form of hackers utilizing […]

Watch Out For Vaccine Survey Phishing Emails

Scammers have found a new way to take advantage of people, so be on your guard. The U.S. Department of Justice has recently issued an alert warning people of fake […]

Cryptomining Worm Botnet Seeking And Attacking Vulnerable Devices

There’s a new cryptomining worm threat to be aware of, and it’s making the lives of IT Administrators who manage Windows and Linux environments nightmarish. This news comes from a […]

The New Realities of a Cybersecurity Response Plan for MSPs

A March 2021 report found that 31 billion data records were compromised in 2020, a number that dwarfs the total of the past 15 years combined. As tactics from phishing […]

Gamers Targeted By Hackers Through Code And Cheat Downloads

Gamers tend to be surprisingly tech savvy, and as such, they’re a bit harder to trick with social engineering than many other groups. Gamers do have a weakness, and it’s […]

New Malware Appears To Be Android App For Free Netflix

If you have an Android device and you’re something of an app fanatic, you may have been tempted by an app called FlixOnline, which was available on the Google Play […]

GET THE SITUATION REPORT

Stay informed about the latest in cybersecurity. Subscribe to The Situation Report to get the information you need to keep your business safe and your data secure.