Navigating the IT security divide

Posted by Mike Vizard on Sep 22, 2016 10:10:16 AM

One of the great paradoxes of IT security is that the people being protected by IT security technologies have more faith in them than the IT professionals that deploy and manage those technologies.

A recent survey of 1,110 senior executives conducted by The Economist Intelligence Unit on behalf of VMware finds that 40 percent of IT executives expect a major attack on their organization to be successful within the next three years. In contrast, only 25 percent of the C-level executives felt the same way.

Read More

Topics: IT Security

FTC lays down the ransomware law

Posted by Mike Vizard on Sep 15, 2016 11:50:04 AM

The chair of the Federal Trade Commission (FTC) is advising businesses that the FTC might hold them accountable for not fixing vulnerabilities commonly exploited by cybercriminals launching ransomware attacks.

FTC Chairwoman Edith Ramirez says the actual ransom demand is usually $500 to $1,000 but can be as high as $30,000. Based on data from the FBI, the U.S. government estimates there are now 4,000 ransomware attacks being launched per day, representing a 300 percent increase over the 1,000 ransomware attacks per day in 2015.

Even more concerning for the average organization, Ramirez also revealed that thus far the FTC has pursued more than 60 enforcement actions against companies that have been hit by ransomware. That may seem like a government effort to punish the victim of a crime, but the FTC is starting to make it clear that the careless handling of data is indeed a potential crime punishable by fines that far exceed the ransom being demanded by hackers.

Read More

Topics: IT Security

2 ways next-generation firewalls outperform UTMs

Posted by Nathan Bradbury on Aug 17, 2016 11:23:57 AM

Since we introduced Barracuda NextGen Firewall – Intronis MSP Edition earlier this summer I’ve talked with a number of MSPs that have asked about the difference between a next-generation firewall (NGFW) like ours and other more traditional unified threat management (UTM) products they’re seeing on the market.

To me, the answer is clear. Next-generation firewalls got their name for a reason. They offer the next generation of protection for your end users’ environments. Let me highlight a couple of the most important differences between NGFWs and UTMs.

Register for the webinar

Read More

Topics: IT Security

It's time to run political campaigns in the cloud

Posted by Ron Miller on Aug 2, 2016 1:58:15 PM

When the DNC got hacked in June, it got added to the list of high-profile hacks nobody wants to be on, joining the likes of Sony, OPM, JP Morgan and Target (among others) in hacking infamy.

Read More

Topics: IT Security, Cloud Trends

Changes in attack patterns create demand for managed security services

Posted by Mike Vizard on Jul 19, 2016 10:03:41 AM

While managed security services providers (MSSPs) have been remotely managing firewalls and anti-virus software deployments for years, it’s become clear over the past 12 months that new classes of threats are doing an end run around those core security technologies. For example, ransomware, which is usually downloaded by an end user who has been tricked into thinking a particular email is a legitimate message, is not something a traditional firewall alone can defend against.

Because of the rapidly evolving threat landscape, a new survey of 591 IT and security professionals conducted by the Ponemon Institute recommends that IT organizations begin to employ cyber threat monitoring tools that keep track of, among other things, social engineering attacks that are starting to proliferate across various social media networks.

Read More

Topics: IT Security

Discover what true Total Data Protection really is

Posted by Neal Bradbury on Jun 21, 2016 4:42:18 PM

As an MSP, you get it. Bad things happen. Whether it’s a system failure, natural disaster, malware infection, or a good old-fashioned data breach, there are so many ways for businesses to suffer data loss. That’s why you want to offer your customers “Total Data Protection” so you can help them recover their data when one of those bad things happens.

But what about preventing that data loss from happening in the first place? Data protection alone isn’t enough to proactively safeguard your SMB customers from the changing landscape of threats and vulnerabilities targeting businesses of all sizes. Don’t be conned into thinking otherwise.

Read More

Topics: IT Security

The growing importance of security breach incident management

Posted by Mike Vizard on Jun 14, 2016 12:00:57 PM

How an IT organization handles a breach is now arguably more important to the business affected than all the time and effort they put into preventing one from happening.

In this day and age, some kind of breach is now almost inevitable. In fact, a new survey of 2,400 end users in the U.S., United Kingdom, and Germany conducted by Centrify, a provider of identity access management software, finds that roughly three quarters of them have come to expect that a business is going to be hacked. Despite having that expectation, however, well over half say it is somewhat likely or very likely that they will stop doing business with an organization that’s been hacked.

Read More

Topics: IT Security

Navigating the nuances of the IT security services paradox

Posted by Mike Vizard on Jun 7, 2016 10:00:00 AM

One of more maddening aspects of being an IT security services provider is the approach organizations take to IT security. In theory, a raft of revelations concerning security breaches should have organizations begging for additional IT security expertise. But a new survey of 500 IT security professionals conducted by CompTIA finds that half of them think the security technologies and processes they have in place today are good enough to protect them.

Yet, the survey also finds that satisfaction with existing security products remains below 50 percent. When the two numbers are considered together, it shows that there is a surprising amount of inertia that providers of IT security services need to overcome. The simple fact of the matter is that there is still a lot of complacency when it comes to IT security despite the near daily revelations concerning one breach or another.

Read More

Topics: IT Security

Who's really responsible for IT security in the cloud?

Posted by Mike Vizard on May 26, 2016 9:33:53 AM

The typical public cloud service provider employs a bifurcated approach to IT security in the cloud. They'll take responsibility for securing the infrastructure services they provide, but any software running on top of those infrastructure services is the responsibility of the developer or the IT organization that put it there.

A new survey of 100 IT decision makers conducted by the market research firm Enterprise Management Associates (EMA) on behalf of iland, a provider of cloud hosting services, finds that when it comes to securing application workloads nearly half (48 percent) of IT organizations are spending more on security technologies than they ever did when they only ran application workloads on premise.

Read More

Topics: IT Security

Cloud security concerns drive IT organizations into the arms of MSPs

Posted by Mike Vizard on May 19, 2016 9:52:28 AM

Given the rate of growth of public cloud services, it’s hard to argue that security concerns are an impediment to adoption. Nevertheless, it’s also clear that cloud security is still a major issue inside most IT organizations.

A new survey of 2,200 IT security professionals, which was conducted by CloudPassage and LinkedIn and released this week, drives this point home. A full 53 percent cite security as a barrier to cloud adoption, followed by compliance (42 percent) and data loss and leakage (40 percent).

Those results might not come as a surprise to most IT service providers, but the way that those organizations intend to solve those problems just might. 

Read More

Topics: IT Security

MSP Marketing Assessment
MSP Phishing Quiz
MSP State of the Industry Survey
Intronis Local Lunches