IoT security concerns start to raise their head

Posted by Mike Vizard on Nov 5, 2015 12:52:39 PM

Despite all the enthusiasm there seems to be for the Internet of Things (IoT) these days, security issues may soon prove to be the undoing of many IoT applications. In fact, a new study reports that not only are consumers concerned about IoT security issues, but a full 90 percent of developers don’t think these applications have the appropriate level of security in place.

For that reason, IT service providers would be well advised to take both a short and long view of IoT opportunities. There are plenty of scenarios where IoT projects on a limited scale can add significant value, but the bigger the IoT project becomes, the greater the attack surface that needs to be defended. Given how poorly well most organizations are doing in terms of securing their existing IT environments, much care needs to be applied to securely manage IoT environments at scale.

Read More

Topics: IT Security, IoT

Calls for increased retail security start to mount

Posted by Mike Vizard on Oct 20, 2015 10:35:32 AM

Despite numerous high-profile breaches, it’s not uncommon to visit a retailer and discover they are still running a point of sale (PoS) system based on Windows XP. But a new survey released this week by the American Bankers Association (ABA) suggests pressure is building to improve security in retail IT environments.

Read More

Topics: IT Security

Takedown of Darkode is only the tip of the IT security iceberg

Posted by Mike Vizard on Jul 21, 2015 12:00:00 PM

For all the back slapping and high fiving that no doubt occurred this past week with the FBI's takedown of the online marketplace for hackers known as Darkode, the troubling news is that there are at least 800 more of these marketplaces out there, and that’s just the ones law enforcement officials know about.

Darkode: In the business of selling malware  

Darkode was clearly one of the larger of these online marketplaces. As part of Operation Shrouded Horizon, law enforcement officials around the globe have arrested more than 70 people, including a 27-year old alleged kingpin of malware living in Sweden.

Read More

Topics: IT Security

5 Reasons selling Password Management as a Service makes sense

Posted by Colin Knox on Jul 15, 2015 12:32:31 PM

Speaking with partners day in and day out, I’ve heard all sorts of horror stories about how they used to store, share, and manage passwords for their client IT systems. By now, most MSPs and IT solution providers have realized and accepted that Excel spreadsheets, Word documents, or even storing passwords in their PSA are not adequate ways to protect this sensitive data. But many of them have stopped at implementing a solution for their own business and never considered the situation their clients are faced with.

Read More

Topics: IT Security, Cyber Security

3 technology advances that may soon render passwords obsolete

Posted by Mike Vizard on Jul 14, 2015 9:47:38 AM

As technology continues to evolve, it looks like the user-name-and-password approach to securing IT systems may finally be heading toward a long overdue retirement. In fact, a new survey from Accenture finds that 77 percent of consumers are now open to alternative approaches.

For IT services firms, the interest in everything from two-factor authentication using smart watches to emerging 3D visualization software offers a big opportunity to help organizations reinvent how they manage security.

Read More

Topics: IT Security

Venom security vulnerability threatens data centers, virtual machines

Posted by Paul Hanley on May 15, 2015 4:50:00 PM

Security researchers at CrowdStrike have uncovered a vulnerability that makes it possible for an attacker to escape from a virtual machine and gain access to the host hypervisor and the other virtual machines running on it. And that could mean trouble for data centers and cloud service providers.

Read More

Topics: IT Security, Cyber Security

5 Ways small business password management helps MSPs succeed

Posted by Colin Knox on May 13, 2015 12:30:00 PM

After working at four different MSPs and eventually founding my own, I’ve experience firsthand the pains of trying to manage hundreds of passwords so techs can gain access to and support client networks. Even though these pains can be hard felt at times, many MSPs still feel a true password management solution isn’t something that would benefit their business much beyond providing a centralized place to securely store their passwords.

Read More

Topics: IT Security, Cyber Security

MSPs need to start talking about cyber security before it’s too late

Posted by Andrew Bagrin on May 6, 2015 2:19:00 PM

As an MSP, you’ve been managing IT for SMBs. You’ve learned to adjust to the numerous changes that technology has thrown your way. You’ve developed new skills and studied new technologies in order to help your customers increase efficiency and enhance the way they run their businesses.

Well, the landscape for SMBs is changing once again. But this time, it’s not about helping customers improve their business. It’s about keeping their business secure from the ever-growing threat of cyber crime.

Read More

Topics: IT Security, Cyber Security

Rombertik: What you need to know about malware’s suicide bomber

Posted by Paul Hanley on May 5, 2015 4:27:30 PM

Researchers at Cisco Systems’ Talos Group have identified a new variety of malware that, if detected, attempts to take its host computer with it. Known as Rombertik, it is unique in terms of the lengths it will go to avoid both detection and removal, but it utterly mundane in terms of its designed function. 

Read More

Topics: Malware, IT Security, Cyber Security

It’s time for IT service providers to kill the username and password

Posted by Mike Vizard on Apr 3, 2015 1:30:00 PM

For all the talk about IT security, most end users are still their own worst enemy. They employ the same basic password time and again and have access to administrative rights most will never need. Invariably, when an end user’s credentials are compromised it turns out the damage done to the system can be directly attributed to the fact that they had administrative rights that enabled hackers to install malware on that machine.

Read More

Topics: IT Security, IT Services Trends

The MSP's Complete Guide to Cyber Security

Follow Intronis

Intronis demo lunch
Fixed Price Data Protection