Threat Watch: Resume Files containing Advanced Persistent Threats

Posted by Lindsay Faria on Mar 14, 2017 8:59:32 AM

As cybercriminals become more duplicitous by the day, businesses and individuals alike need to be more aware than ever of their digital surroundings. One example of this was recently highlighted on the Barracuda blog: Resume files containing Advanced Persistent Threats (APTs).  

This threat counts on unsuspecting email recipients to open a .doc file supposedly containing a resume from a job applicant. From there, chaos ensues.

Read More

Topics: Cyber Security

Ask Intronis: What tools should my MSP use to create videos?

Posted by Lauren Beliveau on Mar 13, 2017 8:30:00 AM

Q: In a recent Ask Intronis post, you talked about how to incorporate videos on an MSP website. There are so many different tools and programs you can use to create video content for current customers and prospects, though. Which ones would do you recommend using?

Video marketing is a great way to give your customers and prospects an opportunity to interact with your MSP. You can use them to answer commonly asked questions, teach prospective customers about new offerings, or educate customers on how to avoid the latest cyberattacks. In fact, 89 percent of customers are likely to share a video they find educational, so video marketing creates an opportunity for your brand to reach prospective customers in different networking circles.

To get you the best advice on what tools you should use to create and develop your videos, we consulted Miguel Leonor, a marketing specialist at Intronis MSP Solutions by Barracuda. Miguel has worked on numerous video projects (including The Intronis Is Always There music video). He shared his advice on how the right tools can make a big difference when it comes to creating a quality video for your customers.

Read More

Topics: Ask Intronis

Tech Time Warp: The Great Michelangelo Scare

Posted by Kate Johanns on Mar 10, 2017 11:33:00 AM

Twenty-five years ago, PC users around the world were left saying “Huh?” after the much-hyped Michelangelo virus turned out to be, well, not much. The virus’ enduring legacy might say more about the media than about a security risk, as attested in a 1992 post-mortem from the American Journalism Review and this recent YouTube video.

Read More

Topics: Tech Time Warp

Cloud 5: Google cloud gets center stage, quantum computing by cloud

Posted by Ron Miller on Mar 10, 2017 10:36:18 AM

Welcome to The Cloud 5, our weekly feature where we scour the web searching for the five most intriguing and poignant cloud links we can find.

Read More

Topics: The Cloud 5

Lessons from XChange University: Even the best security guard needs backup

Posted by Michelle Burke on Mar 9, 2017 9:13:03 PM

In the security space, you’re always on guard, working hard to prevent the next big disaster. Aside from mitigating risk internally — whether that means deciding which vendor will be best to partner with next or which BDR solution could make or break your business — you now need to carefully consider risk from an external perspective.

This past Sunday morning at The Channel Company’s XChange University event, keynote speaker Robert Westervelt of IDC's Data Security practice shared some interesting stats with the audience of MSPs. For example, a recent IDC study revealed that 99 percent of hackers hit already-known vulnerabilities in platforms like Adobe, Microsoft, and Internet browsers.

Read More

Topics: Cyber Security

The march toward cloud neutrality

Posted by Mike Vizard on Mar 9, 2017 11:37:37 AM

At the Google Cloud Next 2017 conference this week, cloud service providers (CSPs) professed much love for the partners they've finally acknowledged are critical to their success in the enterprise. After all, convincing independent software vendors (ISVs) to host their software-as-a-service (SaaS) applications on a cloud is one thing. Getting IT organizations to host enterprise-class workloads on a public cloud requires a level of hand holding that CSPs themselves are not willing to provide directly.

Based on hard-won experience, however, enterprise IT organizations are wary of being locked into a platform. In that light, the most significant announcement at Google Cloud Next was a pledge by SAP to make its HANA in-memory database available on the Google Cloud Platform. SAP already makes HANA available both on a cloud it manages that runs on the IBM Cloud service and on the Amazon Web Services (AWS) and Microsoft Azure clouds.

Read More

Topics: Cloud Trends

Tips for implementing a better backup approach

Posted by Lauren Beliveau on Mar 8, 2017 9:30:00 AM

Safeguarding your customers’ data from today’s evolving threats is no easy task. Especially when it feels like your customers are working against you. For example, SMBs are the primary target for ransomware attacks, but only 34 percent of small businesses test their backups regularly. Avoid the data loss drama this year and create an actionable plan to help your SMB customers establish better backup habits.

Read More

Topics: Business Continuity and Disaster Recovery

IoT solutions will force partners to confront underlying issues

Posted by Mike Vizard on Mar 7, 2017 11:17:48 AM

The rise of the Internet of Things (IoT) is creating all kinds of new opportunities for IT service providers. But like most new areas that open suddenly, there’s a rush on as different types of services providers compete to stake their claims.

A survey of 200 IT decision makers conducted by TechValidate on behalf of Red Hat finds that IoT platform providers and systems integrators are tied at 43 percent each in terms of being engaged by IT decision makers on IoT projects. IT providers came in a close third at 37 percent, followed by communications specialists at 31 percent and IoT consultants at 25 percent.

Read More

Topics: IoT

Ask Intronis: Why is it important for me to secure the public cloud?

Posted by Lauren Beliveau on Mar 6, 2017 8:30:00 AM

Q: My SMB customers are slowly starting to embrace the public cloud. Cloud service providers have built-in security features, though. Is this enough to protect my customers’ data? Are there any additional precautions I should take to make sure their data is secure in the public cloud?

That’s right - according to IDG’s 2016 Cloud Computing Survey, 70 percent of businesses have at least one application in the cloud. For most partners, built-in security features offered by public cloud providers generally are not enough to protect your customers’ data. Today, As cloud adoption continues to increase, now is the time to take the necessary precautions to ensure your customers’ data is safe.

To give you the best advice when it comes to securing the public cloud, we talked to Rich Turner, cloud product marketing manager at Barracuda. Rich is currently leading the messaging regarding public cloud applications and why it’s important to ensure you secure those environments. He shared his advice on why it’s important to be proactive about securing public cloud applications.

Read More

Topics: Ask Intronis

Salesforce rolls on

Posted by Ron Miller on Mar 3, 2017 1:25:49 PM

It's almost like a broken record by now, but Salesforce had another great quarter when it reported its Q4 2017 earnings earlier this week. 

The company raked in $2.2 billion in revenue for the quarter, up 27 percent year over year. What's more, it pulled in $8.39 billion for fiscal 2017, up 26 percent year over year.

Read More

Topics: Cloud Trends

Which Data Loss Gremlin Is Targeting You
MSP Health Check
MSP Phishing Quiz
Intronis Local Lunches
MSP Marketing Assessment