Discover what true Total Data Protection really is

Posted by Neal Bradbury on Jun 21, 2016 4:42:18 PM

As an MSP, you get it. Bad things happen. Whether it’s a system failure, natural disaster, malware infection, or a good old-fashioned data breach, there are so many ways for businesses to suffer data loss. That’s why you want to offer your customers “Total Data Protection” so you can help them recover their data when one of those bad things happens.

But what about preventing that data loss from happening in the first place? Data protection alone isn’t enough to proactively safeguard your SMB customers from the changing landscape of threats and vulnerabilities targeting businesses of all sizes. Don’t be conned into thinking otherwise.

Read More

Topics: IT Security

The growing importance of security breach incident management

Posted by Mike Vizard on Jun 14, 2016 12:00:57 PM

How an IT organization handles a breach is now arguably more important to the business affected than all the time and effort they put into preventing one from happening.

In this day and age, some kind of breach is now almost inevitable. In fact, a new survey of 2,400 end users in the U.S., United Kingdom, and Germany conducted by Centrify, a provider of identity access management software, finds that roughly three quarters of them have come to expect that a business is going to be hacked. Despite having that expectation, however, well over half say it is somewhat likely or very likely that they will stop doing business with an organization that’s been hacked.

Read More

Topics: IT Security

Navigating the nuances of the IT security services paradox

Posted by Mike Vizard on Jun 7, 2016 10:00:00 AM

One of more maddening aspects of being an IT security services provider is the approach organizations take to IT security. In theory, a raft of revelations concerning security breaches should have organizations begging for additional IT security expertise. But a new survey of 500 IT security professionals conducted by CompTIA finds that half of them think the security technologies and processes they have in place today are good enough to protect them.

Yet, the survey also finds that satisfaction with existing security products remains below 50 percent. When the two numbers are considered together, it shows that there is a surprising amount of inertia that providers of IT security services need to overcome. The simple fact of the matter is that there is still a lot of complacency when it comes to IT security despite the near daily revelations concerning one breach or another.

Read More

Topics: IT Security

Who's really responsible for IT security in the cloud?

Posted by Mike Vizard on May 26, 2016 9:33:53 AM

The typical public cloud service provider employs a bifurcated approach to IT security in the cloud. They'll take responsibility for securing the infrastructure services they provide, but any software running on top of those infrastructure services is the responsibility of the developer or the IT organization that put it there.

A new survey of 100 IT decision makers conducted by the market research firm Enterprise Management Associates (EMA) on behalf of iland, a provider of cloud hosting services, finds that when it comes to securing application workloads nearly half (48 percent) of IT organizations are spending more on security technologies than they ever did when they only ran application workloads on premise.

Read More

Topics: IT Security

Cloud security concerns drive IT organizations into the arms of MSPs

Posted by Mike Vizard on May 19, 2016 9:52:28 AM

Given the rate of growth of public cloud services, it’s hard to argue that security concerns are an impediment to adoption. Nevertheless, it’s also clear that cloud security is still a major issue inside most IT organizations.

A new survey of 2,200 IT security professionals, which was conducted by CloudPassage and LinkedIn and released this week, drives this point home. A full 53 percent cite security as a barrier to cloud adoption, followed by compliance (42 percent) and data loss and leakage (40 percent).

Those results might not come as a surprise to most IT service providers, but the way that those organizations intend to solve those problems just might. 

Read More

Topics: IT Security

Class action lawsuit against Wendy's to fuel point-of-sale upgrades

Posted by Mike Vizard on May 5, 2016 12:00:00 PM

With mixed success, the Smart Card Alliance—a consortium of credit card issuers—has been badgering retailers into upgrading their point-of-sale (PoS) systems in order to support smart cards, which incorporate a processor designed to cut down on the number of fraudulent transactions being generated using older credit cards that relied on magnetic strips.

Many retailers, however, balked at adding support for these chip-enabled cards because of the cost of upgrading the PoS systems. The Smart Card Alliance warned retailers that banks would hold them liable for any fraudulent transactions that occurred after the October deadline. Now that shoe has finally dropped in the form of a class action lawsuit being opened against the fast-food chain Wendy’s by First Choice Credit Union.

Read More

Topics: IT Security

Tapping into managed security services remains a challenge

Posted by Mike Vizard on Apr 26, 2016 9:02:40 AM

Managed_Security_Services.jpgThanks to a rash of high-profile security breaches, awareness of IT security issues has never been higher. However, securing an IT environment gets more complex with each passing day.  Given those two factors, demand for managed security services should be escalating.

But a new survey from CompTIA suggests that solution providers across the channel are not tapping into that opportunity. In fact, the survey finds that only one in 10 of those surveyed are leading with their own security services brand rather than the brand of the security vendor. That doesn’t mean that channel partners are not offering security services. For example, a full 67 percent report offering risk management services, and another 61 percent say they have a mobile security service.

Read More

Topics: IT Security

Cybersecurity attacks against IT service providers get more advanced

Posted by Mike Vizard on Feb 2, 2016 10:23:58 AM

Like any pirate, most cybercriminals prefer easy targets. So, while the number of attacks continues to increase, the majority of them are looking to exploit vulnerabilities that are easily defended. A new report from Arbor Networks suggests that the number of sophisticated cybersecurity attacks being launched is on the rise, though.

Read More

Topics: IT Security, Cyber Security

IT security spending to top $36B in 2016

Posted by Mike Vizard on Dec 17, 2015 10:27:13 AM

A new report from the market research firm Ovum predicts that global spending on IT security will exceed $36 billion in 2016. But, where and how those dollars are going to be allocated will likely be very different indeed.

Read More

Topics: IT Security, Cyber Security

IoT security concerns start to raise their head

Posted by Mike Vizard on Nov 5, 2015 12:52:39 PM

Despite all the enthusiasm there seems to be for the Internet of Things (IoT) these days, security issues may soon prove to be the undoing of many IoT applications. In fact, a new study reports that not only are consumers concerned about IoT security issues, but a full 90 percent of developers don’t think these applications have the appropriate level of security in place.

For that reason, IT service providers would be well advised to take both a short and long view of IoT opportunities. There are plenty of scenarios where IoT projects on a limited scale can add significant value, but the bigger the IoT project becomes, the greater the attack surface that needs to be defended. Given how poorly well most organizations are doing in terms of securing their existing IT environments, much care needs to be applied to securely manage IoT environments at scale.

Read More

Topics: IT Security, IoT

The MSP's Complete Guide to Cyber Security
Intronis Local Lunches
Fixed Price Data Protection