Law firms have particular BYOD security, management needs

Posted by Naomi Price on Sep 11, 2014 11:45:00 AM

Many industries are beginning to feel the strain associated with enterprise mobility security, and for good reason, as so many data breaches that have taken place in the past few years have been directly caused by poor BYOD management. Health care is likely the most notable in terms of threat management derived from mobile activities, while banking industry firms have been similarly challenged by an increase in targeted attacks of late. 

Read More

Topics: IT Security

Playing the IT governance card

Posted by Mike Vizard on Sep 3, 2014 8:00:00 AM

More than a fair number of IT organizations are now concerned about the lack of control they have over their IT after an extended period of irrational exuberance involving the adoption of “shadow IT services.”

While none of these organization want to sacrifice the flexibility that many external services running in the cloud provide, they clearly are open to alternatives that provide a modicum of control in a way that doesn’t compromise the overall agility of the business.

With that goal in mind IT service organizations are starting to gain traction with application services in the cloud that provide all the cost and agility benefits of a shared infrastructure in the cloud in a way that provides the governance capabilities that IT organizations crave.

Read More

Topics: IT Security

Ebola virus used as bait in malware and phishing scams

Posted by Manny Veiga on Aug 19, 2014 10:43:23 AM

Cybercriminals are leveraging international media attention on the Ebola virus to launch phishing campaigns designed to trick users into downloading malware or surrendering personal information.

Symantec researchers this week identified at least four malware operations that sought to prey upon the public's interest in the Ebola virus epidemic in West Africa.

It's yet another example of how cybercriminals frequently latch onto popular topics in their social engineering schemes. Other recent examples include a Fourth of July malware that targeted travel websites and a virus disguised as a CryptoLocker fixer tool.

Read More

Topics: IT Security

Cost of managing security has more financial orgs choosing MSPs

Posted by Kristen Ciccolini on Jun 5, 2014 10:49:00 AM

More and more organizations are finding it difficult to keep up with the cost of data security as threats become more challenging to deal with, especially within the financial services industry. As a result, more of these businesses are turning to managed service providers.

According to Larry Tabb, founder and CEO of research firm TABB Group, half of financial institutions will outsource IT management to IT service providers by 2016, with Tabb citing “increased agility, flexibility and responsiveness, faster time-to-market for new products and tighter security” as benefits.

Read More

Topics: IT Security

CIO Lesson: Your system is never as secure as you think it is

Posted by Ron Miller on May 29, 2014 8:30:00 AM

Last week at the MIT Sloan CIO Summit in Cambridge, MA, participants on a panel on the role of the CIO were asked about a big failure during their career. Fidelity Enterprise CTO Stephen Neff told a story that provides a lesson for every IT pro.

You're never as secure as you think you are.

Read More

Topics: IT Security

A traitor in our midst: The insider threat to IT security

Posted by Manny Veiga on May 28, 2014 12:58:00 PM

Plenty of attention has been paid to the IT threats that emerge outside an organization - hackers, APTs, malware - but what tools exist to help IT pros manage the risks sitting right under their noses?

Read More

Topics: IT Security

Don't even think about buying XP patches on the Black Market

Posted by Ron Miller on May 1, 2014 9:15:00 AM

Last week reports surfaced about the possibility of a developing black market for Windows XP patches. If you or your clients are still running XP, here's some good advice: Don't do it. Users are far better off taking the pain of upgrading to a newer version of Windows before gambling security on a black market patch.

Read More

Topics: IT Security

Internet Explorer bug: Protecting XP users (and everyone else too)

Posted by Manny Veiga on Apr 29, 2014 10:53:00 AM

It didn't take long, but security experts have reported the first major zero-day vulnerability in the aftermath of Windows XP's retirement. Microsoft has confimed that all currently supported versions of its Internet Explorer web browser are vulnerable to attack.

Cybersecurity firm FireEye was the first to report the IE bug this past weekend. In a blog post, the company said that attackers are using the vulnerability to actively attack IE versions 9 through 11, although the post specified that older versions of the browser - back to version 6 - are also at risk.

Microsoft issued a security advisory Saturday that included suggested workarounds, and the Department of Homeland Security's U.S. Computer Emergency Readiness Team (U.S.-CERT) suggested the use of alternate browsers for those who cannot use other workarounds.

Read More

Topics: IT Security

Now that Windows XP is gone, what else should you update?

Posted by Kristen Ciccolini on Apr 28, 2014 11:00:00 AM

It’s been two weeks since Microsoft killed support for Windows XP. Have you updated your clients' systems yet?

That's a question all IT sevices providers should consider, especially given the news that 63 percent of businesses do not have the resources to keep their applications updated, according to a new survey by F-Secure.

The report found that many businesses regularly use software that has not been updated, and only 40 percent of respondents actually keep an eye on their software to make sure it's up to date.

Read More

Topics: IT Security

Turning Windows XP End of Support into an MSP opportunity

Posted by Manny Veiga on Apr 21, 2014 1:19:00 PM

It's been nearly two full weeks since Microsoft ceased support for the 13-year-old Windows XP operating system, and organizations worldwide are still working through migration projects.

In an Autotask webinar last week, a panel of channel experts offered tips to help IT services providers execute these migrations and leverage the XP security threat as a business opportunity.

Our own VP of Product Management Chuck DeLouis - who has been waving the XP migration flag for months - talked XP with a panel led by Autotask Senior Vice President of Community and Business Development Len DiCostanzo.

The panel also included Matt Talarczyk, Senior Technical Account Manager at Continuum, Keith Wilson, Product Director for CNet Content Solutions, Raj Khera, CEO of Mailer Mailer, and Neelima Rustagi, Product Manager at Intel McAfee.

Read More

Topics: IT Security