Archive - Business RSS Feed

What’s Worse, an Insider or Outsider Threat?

When IT pros think of hackers, images of young men sitting around a smoky room in Eastern Europe staring at monitors may come to mind. And yes, many hacks, especially large scale incursions, do come from organized groups of outsiders and often foreign entities. This outside threat is why firewalls, and intrusion detection and prevention systems are so common.

But these perimeter defenses do little to fend off what may be the biggest threat – an attack from inside!

Insiders not only have network access, sometimes at a high level, they also know much of what is on the network, and where exactly that data resides. Continue Reading…

Kaseya Powered Services – Authentication and Network Management in an On-Demand Box

Kaseya today announced the fastest, easiest and most effective way for MSPs to deliver authentication and network management as a service. The new Kaseya Powered Services, known as Go-to-Market in a Box, include cloud-based on-demand versions of Traverse and AuthAnvil custom made for fast set up and speedy service creation.

With these powered services, Kaseya has done much of the heavy lifting in developing the services. The MSP can easily take the Kaseya cloud services and offer them as its own. Continue Reading…

GUEST BLOG: Can You Use a Psychologist’s Technique From Good Will Hunting to Make a Breakthrough With IT Marketing?

The Importance of Morale

IT marketing is a cutthroat game where personal feelings do not play into business decisions. No one’s going to buy from your MSP because it will make your salespeople “feel good.” They’re going to buy based on shifting factors which may or may not be legitimate. Oftentimes, clients buy not based on service, but on the perception of quality. They perceive that a given provider will yield a certain level of quality Continue Reading…

Petya May be the Worst Ransomware Ever

Ransomware has been wreaking havoc for years, locking up data and decrypting and releasing it only when money is paid, usually through Bitcoin.

Like any successful malware, new variants are based on the old ones, making it a snap for even amateur-hour hackers to tweak an old exploit and unleash it as new.

So now we have Petya, whose victims already include banks, airports, the metro in Kiev, and even Chernobyl radiation detectors. And this is only the beginning, as the malware is still very much in the wild. Continue Reading…

Really Setting the Record Straight: Response to ConnectWise’s ‘Fake News’ Blog Post

On May 19, 2017, Arnie Bellini, the CEO of ConnectWise, published a blog on the ConnectWise website titled “Setting the Record Straight: ConnectWise & Kaseya.” That same day, he emailed me directly to say, “Come on Man!” from “one Italian CEO to another” and attached a threat letter from ConnectWise’s lawyers.

Let me set the record straight. Kaseya never said that ConnectWise was discontinuing its Automate (formerly LabTech) product line. Kaseya welcomes the competition and looks forward to facing off with ConnectWise in the marketplace by offering the BEST products available. We at Kaseya are very proud to offer the industry-leading MSP Platform, which is flexible, reliable, secure, scalable and open — everything that MSPs need to scale their operations and grow their businesses. Continue Reading…

WannaCry Ransomware Exposes Crisis of Unpatched Systems, Failure to Back up

 

Would it surprise you to learn that one of the most successful computer exploits in history happened against a vulnerability for which a patch already exists?

That’s just what happened with the WannaCry (also called WannaCrypt) ransomware attack that crippled hundreds of thousands of computers last Friday and continues to wreak havoc this week. Continue Reading…

Blocking Windows 10 Creators Update and File Explorer Ads

ad-block-image-big

Not every upgrade is welcome, even if it does provide a bevy of features. Takes Windows 10 Creators Update, which started rolling out to beta testers and will next be delivered to the vast body of Windows 10 users.

This update includes a bunch of new items that will please consumers and gamers, but do far less for enterprise customers. Because of its consumer bent, enterprises may want to block or at least delay this upgrade.

But there is a more compelling reason to say no, according to long time Windows guru Paul Thurrott. Creators Update means your Windows File Explorer could be stuffed with ads. While many of these are for useful Microsoft services such as OneDrive, the technology makes a veritable wave of ads possible. Continue Reading…

Guest Blog: Make Sure to Think Happy IT Marketing Thoughts to Fly!

freedom-guestblog-big

IT marketing requires a positive attitude. This is where fiction, as an educational medium, becomes one of the most useful tools, and to that end, it’s worthwhile to consider J.M. Barrie’s character Peter Pan.

The story has captured the imagination of children worldwide for decades, and it’s easy to see why: you can fly. Peter Pan points to a happy thought and some pixie dust as a recipe for becoming airborne. You get your happy thought, hold onto it, and begin to soar. Now, not many realize this, but that character and plot device (happy thoughts as a means of flight) are both real aspects of Barrie’s life. There are speculations that Captain Hook represented Barrie’s wife, and Continue Reading…

Massive iCloud Hack Shows Criticality of Strong Authentication

icloud-hack-big

Apple has a reputation for building secure systems. The Mac is still far more hack proof than PCs, and the iPhone being a closed system has not been hit with a plethora of malware.

The iCloud had much the same reputation – until this week.

Hackers reportedly successfully compromised millions of iCloud logins. The hackers, dubbed the Turkish Crime Family (but ironically based in London), then demanded Apple given them $100,000 in iTunes cards. This is a takeoff on ransomware. Instead of locking up data and demanding money, the bad guys steal data and want cash for its return. The group has been trying to extort money in return for the log ins from other companies as well. Continue Reading…

Six Ways CIOs Can Harness Cloud and Network Monitoring to Keep the Business Running

cio-hybrid-cloud-blog-big

When C-level IT execs think of business continuity, their minds usually wander to backing up and recovering data.  They worry about how to deploy seamless, ultrafast access to backup data when the primary systems and storage have been compromised.

But a complete business continuity plan needs to address an even more pressing issue.  Despite all the attention paid to backup and recovery, the network generally goes down more often than storage crashes. And without the network (and all the infrastructure and data centers dependent on that network) running, key business applications and services stop in their tracks. Continue Reading…

Page 1 of 912345»...Last »
-->