Quiz: Which data loss gremlin are you?

Posted by Anne Campbell on Mar 26, 2015 9:00:00 AM

With World Backup Day right around the corner, we’ve been spending a lot of time here at Intronis talking about the data loss gremlins and the major threats they represent to MSPs and their small business customers.

The problems the data loss gremlins can cause are serious. According to the National Archives & Records Administration in Washington, DC, 93 percent of SMBs that lose data access for 10 or more days are bankrupt in a year.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Demand for managed security services grows as threats increase

Posted by Mike Vizard on Mar 12, 2015 3:54:00 PM

With information security becoming a challenge that is too big for most organizations to handle, there’s now more interest in relying on third-party experts to manage it. In fact, a new study from ABI Research forecasts that demand for managed security services will grow from $15.4 billion this year to $32.9 billion in 2020. Much of that demand is likely to be driven by the line of business executives who are coming to the realization that no matter how skilled their internal IT organization is, the task of securing information these days is beyond the means of a single IT department.

Read More

Topics: IT Security, IT Services Trends

Lenovo’s SuperFish software threatens user security

Posted by Paul Hanley on Mar 11, 2015 3:57:43 PM

Lenovo recently announced that the SuperFish software, which came pre-installed on their consumer-grade devices, needed to be removed from every system. Logically, many were asking what the intent of the software was and why it needed to be removed.

Read More

Topics: IT Security, Announcements

Video: Intronis Winter Release ‘15 Preview

Posted by Achmad Chadran on Mar 5, 2015 11:42:00 AM

Today we're launching our Winter Release ’15, and the entire Intronis team is juiced. Why? Quite simply because this release delivers the strongest version of the Intronis ECHOplatform to date. From the very outset, we’ve designed this release to help you broaden your client base, expand services for existing clients, and streamline your operations. The feedback from our beta test partners has been extremely positive.

Read More

Topics: IT Security, Virtualization, VMware backup, Hyper-V Backup, Object Level Recovery

Infographic: 5 Tips for Approaching Customers about Cloud Security

Posted by Lindsay Faria on Feb 3, 2015 9:43:00 AM

A key goal of ours here at Intronis is to enable managed service providers to better meet the needs of their small and medium-sized business customers. One topic that comes up consistently as a concern is security.

There are a lot of choices out there when it comes to selecting technology solutions, and evaluating the security and compliance features of cloud solutions can be tricky for SMBs. We know that some customers are less comfortable than others with the concept of the cloud, seeing the term “cloud security” as an oxymoron. For this reason, the idea of approaching customers with these cloud-based solutions can sound like a formidable task.

Read More

Topics: IT Security, Cyber Security

Oh no they didn’t. Security password mistakes to avoid.

Posted by Lindsay Faria on Jan 23, 2015 3:27:23 PM

If you haven’t already checked out the list of “Worst Passwords” released by SplashData earlier this week, you may want to—and soon.

Each year, the company publishes a list of the riskiest passwords, which frighteningly, are also the most common. In an age where we all have countless passwords to keep track of, and more and more of our business continuity depends on the security of our data, it’s more important than ever to make sure we’re not leaving ourselves fully exposed to the risk of having our accounts compromised.

Read More

Topics: IT Security, Cyber Security

IT security best practice: make no assumptions

Posted by Lindsay Faria on Nov 18, 2014 10:00:00 AM

Today, I came across a thought-provoking post from Tony Carothers on the danger of making assumptions when it comes to IT security. The takeaway was simple and straightforward: “Do not assume that because a company has been in business for “x” years, or they are the hottest product on the market, that it is backed by solid security.  That is an assumption that can cost.  Dearly.”

Read More

Topics: IT Security, Partner Support

Things are getting real in data security regulation

Posted by Intronis Staff on Nov 18, 2014 9:02:00 AM

Managed service providers once had what would be viewed today as a relatively simple responsibility when it comes to their own security and compliance procedures. However, a combination of much higher rates of cybercrime, data breaches and identity theft along with the transforming state of federal regulations, has made things a bit more complicated, and these firms are now also expected to take a stance on privacy protection that was once saved for advocacy groups and the like. 

Read More

Topics: IT Security

The Perils of IT Security Services Profitability

Posted by Mike Vizard on Oct 20, 2014 8:00:00 AM

Providing IT security has never been an activity for the feint of hearts, which is one of the primary reasons that many IT services firms are reluctant to engage in providing IT security unless they really specialize it.

Read More

Topics: IT Security, Cyber Security

Don't overlook insider cyber security threats

Posted by Alan Earls on Oct 13, 2014 8:30:00 AM

In continuing to focus on IT security related topics, in conjunction with National Cyber Security Awareness Month, it makes sense for businesses to stop and “look in the mirror.” While there is tremendous attention given to the outside security threats such as hackers and advanced persistent threats (APTs), the potential damage that insiders can do is sometimes overlooked. And, according to experts, while the threat may be technological, the solution is at least partly “human.”  

Read More

Topics: IT Security, Cyber Security


Follow Intronis