Archive - Security RSS Feed

MSP Tightens Passwords, Boosts Revenue with AuthAnvil Multi-Factor Authentication

CCL_CS_image (1)

Most managed service providers (MSPs) base their core business on managing remote systems through a remote monitoring and management (RMM) solution.

But smart service providers are adding complimentary services on top of this, and multi- and two-factor authentication (2FA) is one of the more fertile areas.

New Zealand MSP Computer Concepts Limited (CCL) knew its clients were worried about security after hearing about the massive breaches experienced by Target, Anthem, Home Depot, and others. Continue Reading…

Massive iCloud Hack Shows Criticality of Strong Authentication

icloud-hack-big

Apple has a reputation for building secure systems. The Mac is still far more hack proof than PCs, and the iPhone being a closed system has not been hit with a plethora of malware.

The iCloud had much the same reputation – until this week.

Hackers reportedly successfully compromised millions of iCloud logins. The hackers, dubbed the Turkish Crime Family (but ironically based in London), then demanded Apple given them $100,000 in iTunes cards. This is a takeoff on ransomware. Instead of locking up data and demanding money, the bad guys steal data and want cash for its return. The group has been trying to extort money in return for the log ins from other companies as well. Continue Reading…

CompTIA Predicts Strong IT Growth, Cloud Getting Stronger and Security Not Getting Better

comptia-cloud-forecast-blog-big

Channel advocacy group CompTIA tracks the MSP market as well as the overall IT space. News for the latter is good, though the growth is not exactly stunning. One item the group tracks in their annual IT Trends Analysis survey is what they call “Business Confidence”. According to the execs surveyed, the economy is in good shape and IT pros have a positive outlook.

Meanwhile growth is healthy, but nowhere the double digits that characterized the 1980’s and 1990’s. In fact, CompTIA expects 4.1 percent growth globally this year, creating a $3.5 trillion market. Continue Reading…

Kaseya Partners with Webroot to Help MSPs Offer Total Endpoint Security

Kaseya-Webroot-Integration-blog

Security is the No. 1 issue MSPs face today, and keeping client endpoints safe is paramount. Providers that rely on Kaseya VSA now not only have Webroot SecureAnywhere fully integrated with the RMM, but they also can purchase this endpoint protection directly from Kaseya. Continue Reading…

Data Breaches – How MSPs Can Look Out for Clients and Themselves

data-breach-msp-blog-big

Data breaches are one of an organization’s biggest nightmares. Not only are your systems compromised, but precious data is taken. In an upcoming webinar, Kaseya and security partner Ease Technologies detail how MSP and client data can be protected to ward off breaches.

MSPs have two types of data and network access to protect – their own and that of their clients. There have always been threats to both, but nowadays hackers are largely after data – and date breaches are becoming more serious every day. As an MSP, your business is protecting client data. Do it right and you gain your client’s trust, longer contracts, and great word of mouth. Fail, and the relationship is lost forever.

Is there anything worse? Sure. Having your operations cracked, which could give the bad guys the keys to your clients’ kingdoms. Continue Reading…

Why SMBs and MMEs Can’t Rely on the Perimeter, but Need Layered Security

layered-security-mme-blog-big

In a recent eBook, Best Practices To Protect Your Company’s Data and Infrastructure Through Layered Security, Kaseya and Kaspersky Lab detailed what SMB and MME IT shops can do to truly protect themselves.

The basics offer frontline protection. Firewalls, antivirus, anti-malware, and password policies are a great start. The bad news is that the bad guys have been either cracking or bypassing these defenses for years. It’s old hat. Continue Reading…

Delivering Security Services Now Critical to MSP Success

mspmentor-feb-blog-big

MSPs have largely leveled the playing field for SMBs, enabling these organizations to deliver an optimal customer experience and service users as handily as their larger counterparts. But underpinning this success is a plethora of customer data that must be securely captured, stored and accessed.

This presents an array of challenges for the majority of SMBs that are not well-versed in IT security. For SMBs already relying on an MSP, shifting the security burden is an easy and straightforward decision.

But the buck stops at the MSP. You must ensure your customers (and your business) are protected from data breaches, 63 percent of which, according to Verizon’s 2016 Data Breach Investigations Report, are due to weak, default or stolen passwords. Continue Reading…

Remote Access Work Systems Cut Business Costs

remote-access-work-system-big

In these competitive times, businesses have to do what they can to trim the fat and cut costs. This is often an unpleasant process. Cutting costs can mean laying off employees, reducing benefits packages, or moving to smaller or less appealing offices. All too often, reducing business expenses means getting rid of the things that make employees happy and productive. For that reason, cuts can hurt a business more than help.

But that doesn’t have to be the case. Some cost cutting solutions save businesses money without reducing employee numbers or worker satisfaction. In fact, what I’m talking about can boost worker happiness and productivity! Continue Reading…

Two-Factor Authentication: Double your Defense Against Hackers

hacker-protection-blog-wordpress

With the ever aggressive advancement of digital crime from cyber-thieves, and the increase of Internet fraud, companies now fully recognize the importance of high level security. Many businesses know they can’t completely protect their workers’ usernames, passwords and logins through traditional, largely manual means. The companies that really get this use two-factor authentication (2FA) as a defense against hackers trying to gain access to online accounts and company servers. Continue Reading…

Secure Your Critical Cloud ERP and CRM Data Straight to the Last Mile

cloud-crm-blog-big

In the early days of the cloud, IT worried about security. After all, if your data isn’t in your own hands, how do you know it’s safe?

Fortunately, it is cloud vendors’ business to make their systems secure and they have layers of professionals and security tools to do so. Today, one could reasonably argue that cloud services from reputable providers are safer than in-house applications.

Safer yes, within the confines of the provider’s infrastructure. But there is one key area of vulnerability – end user access. In order for cloud services such as ERP or CRM to provide business value, your end users, and sometimes even your partners, need to access the system, get at the data, and update records. If a hacker gets the keys to this kingdom, they can see what your end users see, steal your data, or corrupt the system. Continue Reading…

Page 1 of 512345»
-->