Takedown of Darkode is only the tip of the IT security iceberg

Posted by Mike Vizard on Jul 21, 2015 12:00:00 PM

For all the back slapping and high fiving that no doubt occurred this past week with the FBI's takedown of the online marketplace for hackers known as Darkode, the troubling news is that there are at least 800 more of these marketplaces out there, and that’s just the ones law enforcement officials know about.

Darkode: In the business of selling malware  

Darkode was clearly one of the larger of these online marketplaces. As part of Operation Shrouded Horizon, law enforcement officials around the globe have arrested more than 70 people, including a 27-year old alleged kingpin of malware living in Sweden.

Read More

Topics: IT Security

5 Reasons selling Password Management as a Service makes sense

Posted by Colin Knox on Jul 15, 2015 12:32:31 PM

Speaking with partners day in and day out, I’ve heard all sorts of horror stories about how they used to store, share, and manage passwords for their client IT systems. By now, most MSPs and IT solution providers have realized and accepted that Excel spreadsheets, Word documents, or even storing passwords in their PSA are not adequate ways to protect this sensitive data. But many of them have stopped at implementing a solution for their own business and never considered the situation their clients are faced with.

Read More

Topics: IT Security, Cyber Security

3 technology advances that may soon render passwords obsolete

Posted by Mike Vizard on Jul 14, 2015 9:47:38 AM

As technology continues to evolve, it looks like the user-name-and-password approach to securing IT systems may finally be heading toward a long overdue retirement. In fact, a new survey from Accenture finds that 77 percent of consumers are now open to alternative approaches.

For IT services firms, the interest in everything from two-factor authentication using smart watches to emerging 3D visualization software offers a big opportunity to help organizations reinvent how they manage security.

Read More

Topics: IT Security

Venom security vulnerability threatens data centers, virtual machines

Posted by Paul Hanley on May 15, 2015 4:50:00 PM

Security researchers at CrowdStrike have uncovered a vulnerability that makes it possible for an attacker to escape from a virtual machine and gain access to the host hypervisor and the other virtual machines running on it. And that could mean trouble for data centers and cloud service providers.

Read More

Topics: IT Security, Cyber Security

5 Ways small business password management helps MSPs succeed

Posted by Colin Knox on May 13, 2015 12:30:00 PM

After working at four different MSPs and eventually founding my own, I’ve experience firsthand the pains of trying to manage hundreds of passwords so techs can gain access to and support client networks. Even though these pains can be hard felt at times, many MSPs still feel a true password management solution isn’t something that would benefit their business much beyond providing a centralized place to securely store their passwords.

Read More

Topics: IT Security, Cyber Security

MSPs need to start talking about cyber security before it’s too late

Posted by Andrew Bagrin on May 6, 2015 2:19:00 PM

As an MSP, you’ve been managing IT for SMBs. You’ve learned to adjust to the numerous changes that technology has thrown your way. You’ve developed new skills and studied new technologies in order to help your customers increase efficiency and enhance the way they run their businesses.

Well, the landscape for SMBs is changing once again. But this time, it’s not about helping customers improve their business. It’s about keeping their business secure from the ever-growing threat of cyber crime.

Read More

Topics: IT Security, Cyber Security

Rombertik: What you need to know about malware’s suicide bomber

Posted by Paul Hanley on May 5, 2015 4:27:30 PM

Researchers at Cisco Systems’ Talos Group have identified a new variety of malware that, if detected, attempts to take its host computer with it. Known as Rombertik, it is unique in terms of the lengths it will go to avoid both detection and removal, but it utterly mundane in terms of its designed function. 

Read More

Topics: Malware, IT Security, Cyber Security

It’s time for IT service providers to kill the username and password

Posted by Mike Vizard on Apr 3, 2015 1:30:00 PM

For all the talk about IT security, most end users are still their own worst enemy. They employ the same basic password time and again and have access to administrative rights most will never need. Invariably, when an end user’s credentials are compromised it turns out the damage done to the system can be directly attributed to the fact that they had administrative rights that enabled hackers to install malware on that machine.

Read More

Topics: IT Security, IT Services Trends

TeslaCrypt and CryptoWall bring new approaches to ransomware

Posted by Paul Hanley on Mar 30, 2015 2:00:00 PM

As the saying goes, what’s old is new again, but sometimes what’s new can still be new again.  Enigmatic?  Perhaps, but two programs in the ransomware category are doing their best to prove this.  An old friend that I’ve written about several times now, CryptoWall, is pioneering a new infection vector, while a fresh challenger, TeslaCrypt, is seeking to carve out a new target niche that has been underexploited.  Let’s see why security experts are concerned about these two infectious agents.

Read More

Topics: Malware, IT Security, Cyber Security

16 Things the Data Loss Gremlins Hate

Posted by Anne Campbell on Mar 30, 2015 12:30:00 PM

The troublesome data loss gremlins are always plotting devious new ways to destroy your most important data and ruin your day—and your livelihood. As soon as you let down your guard, they’ll sneak up on you with a nasty surprise, like a security breach, a server meltdown, or a devastating fire that will leave you and your customers scrambling to pick up the pieces.

That doesn’t mean you’re totally defenseless, though. Every data loss gremlin has a weakness, something they hate with a passion because it keeps foiling their evil plans. Knowing what these weaknesses are will help you scare off Scratch, Scorch, Klepto, Mal, Mayhem, and Whoopsie Daisy and keep your data safe.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Fixed Price Data Protection

Follow Intronis