Venom security vulnerability threatens data centers, virtual machines

Posted by Paul Hanley on May 15, 2015 4:50:00 PM

Security researchers at CrowdStrike have uncovered a vulnerability that makes it possible for an attacker to escape from a virtual machine and gain access to the host hypervisor and the other virtual machines running on it. And that could mean trouble for data centers and cloud service providers.

Read More

Topics: IT Security, Cyber Security

5 Ways small business password management helps MSPs succeed

Posted by Colin Knox on May 13, 2015 12:30:00 PM

After working at four different MSPs and eventually founding my own, I’ve experience firsthand the pains of trying to manage hundreds of passwords so techs can gain access to and support client networks. Even though these pains can be hard felt at times, many MSPs still feel a true password management solution isn’t something that would benefit their business much beyond providing a centralized place to securely store their passwords.

Read More

Topics: IT Security, Cyber Security

MSPs need to start talking about cyber security before it’s too late

Posted by Andrew Bagrin on May 6, 2015 2:19:00 PM

As an MSP, you’ve been managing IT for SMBs. You’ve learned to adjust to the numerous changes that technology has thrown your way. You’ve developed new skills and studied new technologies in order to help your customers increase efficiency and enhance the way they run their businesses.

Well, the landscape for SMBs is changing once again. But this time, it’s not about helping customers improve their business. It’s about keeping their business secure from the ever-growing threat of cyber crime.

Read More

Topics: IT Security, Cyber Security

Rombertik: What you need to know about malware’s suicide bomber

Posted by Paul Hanley on May 5, 2015 4:27:30 PM

Researchers at Cisco Systems’ Talos Group have identified a new variety of malware that, if detected, attempts to take its host computer with it. Known as Rombertik, it is unique in terms of the lengths it will go to avoid both detection and removal, but it utterly mundane in terms of its designed function. 

Read More

Topics: Malware, IT Security, Cyber Security

It’s time for IT service providers to kill the username and password

Posted by Mike Vizard on Apr 3, 2015 1:30:00 PM

For all the talk about IT security, most end users are still their own worst enemy. They employ the same basic password time and again and have access to administrative rights most will never need. Invariably, when an end user’s credentials are compromised it turns out the damage done to the system can be directly attributed to the fact that they had administrative rights that enabled hackers to install malware on that machine.

Read More

Topics: IT Security, IT Services Trends

TeslaCrypt and CryptoWall bring new approaches to ransomware

Posted by Paul Hanley on Mar 30, 2015 2:00:00 PM

As the saying goes, what’s old is new again, but sometimes what’s new can still be new again.  Enigmatic?  Perhaps, but two programs in the ransomware category are doing their best to prove this.  An old friend that I’ve written about several times now, CryptoWall, is pioneering a new infection vector, while a fresh challenger, TeslaCrypt, is seeking to carve out a new target niche that has been underexploited.  Let’s see why security experts are concerned about these two infectious agents.

Read More

Topics: Malware, IT Security, Cyber Security

16 Things the Data Loss Gremlins Hate

Posted by Anne Campbell on Mar 30, 2015 12:30:00 PM

The troublesome data loss gremlins are always plotting devious new ways to destroy your most important data and ruin your day—and your livelihood. As soon as you let down your guard, they’ll sneak up on you with a nasty surprise, like a security breach, a server meltdown, or a devastating fire that will leave you and your customers scrambling to pick up the pieces.

That doesn’t mean you’re totally defenseless, though. Every data loss gremlin has a weakness, something they hate with a passion because it keeps foiling their evil plans. Knowing what these weaknesses are will help you scare off Scratch, Scorch, Klepto, Mal, Mayhem, and Whoopsie Daisy and keep your data safe.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Quiz: Which data loss gremlin are you?

Posted by Anne Campbell on Mar 26, 2015 9:00:00 AM

With World Backup Day right around the corner, we’ve been spending a lot of time here at Intronis talking about the data loss gremlins and the major threats they represent to MSPs and their small business customers.

The problems the data loss gremlins can cause are serious. According to the National Archives & Records Administration in Washington, DC, 93 percent of SMBs that lose data access for 10 or more days are bankrupt in a year.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Demand for managed security services grows as threats increase

Posted by Mike Vizard on Mar 12, 2015 3:54:00 PM

With information security becoming a challenge that is too big for most organizations to handle, there’s now more interest in relying on third-party experts to manage it. In fact, a new study from ABI Research forecasts that demand for managed security services will grow from $15.4 billion this year to $32.9 billion in 2020. Much of that demand is likely to be driven by the line of business executives who are coming to the realization that no matter how skilled their internal IT organization is, the task of securing information these days is beyond the means of a single IT department.

Read More

Topics: IT Security, IT Services Trends

Lenovo’s SuperFish software threatens user security

Posted by Paul Hanley on Mar 11, 2015 3:57:43 PM

Lenovo recently announced that the SuperFish software, which came pre-installed on their consumer-grade devices, needed to be removed from every system. Logically, many were asking what the intent of the software was and why it needed to be removed.

Read More

Topics: IT Security, Announcements

KEEP UP WITH THE LATEST CLOUD NEWS

Follow Intronis