• NCSAM: Responding to and Recovering from Threats as They Arise

    In our previous post for National Cybersecurity Awareness Month (NCSAM), we talked about detecting threats. As threats have changed, particularly during the past year, having the right tools and processes in place to detect threats as they arise is crucial for maintaining a strong security posture.  Read More

  • 6 Cybersecurity Tips for Business Email

    According to https://enterprise.verizon.com/resources/reports/dbir/" target="_blank">Verizon’s 2019 Data Breach Intelligence Report 94% of malware was delivered via email. Read More

  • October 2020 Patch Tuesday—Smaller than usual, but some systems need patching now

    This October Patch Tuesday is the first batch this year that fixes less than 100 vulnerabilities. But don’t be fooled by that, as there are several in this group that do warrant your attention. This month Microsoft fixed a total of 88 vulnerabilities, with 11 marked as “Critical,” and the rest “Important” with one “Moderate” exception. Pay special attention to the “Important” ones I cover this month, as many of them are listed as “Exploitation More Likely” and will be in the priority list. Read More

  • NCSAM: Detecting the Latest Cyberthreats

    Last week, we talked about preparing your customer environments and helping prevent threats from even reaching devices or accounts in the first place. You need this solid foundation to keep customers safe.  But security isn’t static. A decade ago, you may have been able to just put up a firewall and use AV alone, then call it a day. Viruses were typically just nuisances, rather than major (potentially company-annihilating) risks. But those days are long gone, and prevention can’t stop it all.  Read More

  • 5 Excellent Benefits of Using a Network Topology Tool

    In the digital era, modern businesses rely on technology and connectivity in such a way that even a minor network issue can halt productivity and incur significant costs. If one of the customers of your managed services provider (MSP) experiences a network issue as described, they will be left frustrated and may potentially even consider taking their business elsewhere. Read More

  • Cybersecurity Best Practices: A Guide for MSPs and Enterprises

    MSPs handle large amounts of sensitive data, which is why cybercriminals view them as good potential targets. To adequately protect this sensitive data from today’s sophisticated attacks, it is crucial that MSPs leverage cybersecurity best practices to ensure the safety and security of their own systems and their customers’ systems.  Read More

  • Automation Solutions: 10 Ways to Make Your MSP More Effective

    Automation technology continues to become more sophisticated, allowing managed services providers (MSPs) to automate repetitive but important tasks with minimal effort. In fact, the right task automation solution can help you automate key operations without even needing to learn a new scripting language. IT automation is getting easier, less time-consuming, and more cost-effective, helping MSPs streamline their operations and boost the efficiency of their day-to-day activities.  Read More