Advanced hacker groups are attacking MSPs in an active campaign of cyber attacks, according to an alert from the U.S. Dept. of Homeland Security.
Who is behind the attacks? What do they want? And how do you protect your IT business and your clients? Find out here.Continue reading
Social engineering tactics are on the rise among hackers. More are calling victims and sending text messages – trying to con them into downloading remote desktop software or install malware.
See the top social engineering tactics used today in cyber crime. Raise awareness to arm yourself and your staff against phishing and con artists both in person and online.Continue reading
Did you know that some security products can make you less safe online? Researchers found one feature – HTTPS traffic inspection – almost always harms the security of people who use it.
Find out how SSL filters harm the security of millions of people every day, and also see how the HTTPS web filter in AccessEnforcer is different.Continue reading
Small businesses take note: denial-of-service attacks continue to grow in strength and hundreds of thousands are launched each month.
See the latest trends in DDoS attacks – including two record-breakers this year that shocked security researchers.Continue reading
New vulnerabilities are discovered every week – some silly and some severe. Knowing which are the most dangerous depends on several factors, including the popularity of the flaw among data thieves.
See the top 10 vulnerabilities in exploit kits in 2017. We list and describe each security flaw and also explain why Adobe products no longer dominate the top 10.Continue reading
A nasty strain of malware has infected hundreds of thousands of routers – and it’s worse than initially thought.
See who is vulnerable to VPNFilter, how it works, and who might be responsible for launching it.Continue reading
The Verizon DBIR is one of the most respected cyber security reports published each year – but can you trust the data?
See errors we found in the new 2018 edition of the DBIR. Decide for yourself if the report is trustworthy.Continue reading
Most IT firms have clients from a range of industries. That means you encounter a wide range of security threats. How do you know which threats are the most important to focus on?
Check out the leading causes of data breaches across eight sectors. You’ll see attack trends in retail, healthcare, finance, government, and more – and even a few surprises.Continue reading
Two massive chip vulnerabilities are here and the security industry is scrambling for answers. Misinformation is everywhere, and even the patches are wreaking havoc.
Find the answers to your questions on Spectre and Meltdown in this post. You’ll see the problem, the solution, and know which rumors are fake news.Continue reading