Ransomware attacks are on the rise. When government is targeted, politicians take note. Attacks on Louisiana public agencies led the state to pass the first-ever bill specifically regulating managed service providers (MSPs). Here’s what you can do about changing MSP regulations. Our most recent blog outlined the basics of the … Continue reading
Two decades ago, Managed Service Providers (MSP) barely existed. Two years ago, there were still a huge number of people who had no idea what an MSP was or did. In June 2020, the state of Louisiana passed legislation specifically regulating MSPs. “It’s been a fight for a long time … Continue reading
Remote access software is widely used by small businesses for work-from-home. Yet there are security problems. Adding layers can help shore up protections. In 2020, the number of people working remotely jumped dramatically. Yet unsafe work-from-home solutions increase the small business’s attack surface. Adding layers of online protection can help … Continue reading
Calyptix Security Releases AccessEnforcer 5.0 Beta to Add Network Authentication for Microsoft RDP and SSH Access
Charlotte, NC – Calyptix Security Corporation, maker of the AccessEnforcer® UTM Firewall, today announced the release of AccessEnforcer 5.0 Beta at CompTIA ChannelCon Online which adds GatekeeperTM and Geo Fence, innovative new features for small business to secure remote access to potentially vulnerable systems and provide a work from home … Continue reading
Risk assessments are a HIPAA requirement. Yet, seven of the nine HIPAA penalties announced this year (78%) were levied on organizations that failed to conduct one.
In this post, we explore two cases where risk assessments were not conducted, and also highlight a free resource to help smaller organizations get the job done.Continue Reading →
Ransomware attacks have changed. They’re more targeted, more dangerous, and causing more financial damage to victims than ever, according to the FBI.
See the industries hit hardest by the new rash of ransomware attacks – including examples of companies that ransomware killed. You’ll see the tactics being used and how to fight them.Continue Reading →