It’s time for IT service providers to kill the username and password

Posted by Mike Vizard on Apr 3, 2015 1:30:00 PM

For all the talk about IT security, most end users are still their own worst enemy. They employ the same basic password time and again and have access to administrative rights most will never need. Invariably, when an end user’s credentials are compromised it turns out the damage done to the system can be directly attributed to the fact that they had administrative rights that enabled hackers to install malware on that machine.

Read More

Topics: IT Security, IT Services Trends

TeslaCrypt and CryptoWall bring new approaches to ransomware

Posted by Paul Hanley on Mar 30, 2015 2:00:00 PM

As the saying goes, what’s old is new again, but sometimes what’s new can still be new again.  Enigmatic?  Perhaps, but two programs in the ransomware category are doing their best to prove this.  An old friend that I’ve written about several times now, CryptoWall, is pioneering a new infection vector, while a fresh challenger, TeslaCrypt, is seeking to carve out a new target niche that has been underexploited.  Let’s see why security experts are concerned about these two infectious agents.

Read More

Topics: Malware, IT Security, Cyber Security

16 Things the Data Loss Gremlins Hate

Posted by Anne Campbell on Mar 30, 2015 12:30:00 PM

The troublesome data loss gremlins are always plotting devious new ways to destroy your most important data and ruin your day—and your livelihood. As soon as you let down your guard, they’ll sneak up on you with a nasty surprise, like a security breach, a server meltdown, or a devastating fire that will leave you and your customers scrambling to pick up the pieces.

That doesn’t mean you’re totally defenseless, though. Every data loss gremlin has a weakness, something they hate with a passion because it keeps foiling their evil plans. Knowing what these weaknesses are will help you scare off Scratch, Scorch, Klepto, Mal, Mayhem, and Whoopsie Daisy and keep your data safe.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Quiz: Which data loss gremlin are you?

Posted by Anne Campbell on Mar 26, 2015 9:00:00 AM

With World Backup Day right around the corner, we’ve been spending a lot of time here at Intronis talking about the data loss gremlins and the major threats they represent to MSPs and their small business customers.

The problems the data loss gremlins can cause are serious. According to the National Archives & Records Administration in Washington, DC, 93 percent of SMBs that lose data access for 10 or more days are bankrupt in a year.

Read More

Topics: Malware, IT Security, Business Continuity and Disaster Recovery, Cloud Backup and Recovery, Data Loss, Cyber Security

Demand for managed security services grows as threats increase

Posted by Mike Vizard on Mar 12, 2015 3:54:00 PM

With information security becoming a challenge that is too big for most organizations to handle, there’s now more interest in relying on third-party experts to manage it. In fact, a new study from ABI Research forecasts that demand for managed security services will grow from $15.4 billion this year to $32.9 billion in 2020. Much of that demand is likely to be driven by the line of business executives who are coming to the realization that no matter how skilled their internal IT organization is, the task of securing information these days is beyond the means of a single IT department.

Read More

Topics: IT Security, IT Services Trends

Lenovo’s SuperFish software threatens user security

Posted by Paul Hanley on Mar 11, 2015 3:57:43 PM

Lenovo recently announced that the SuperFish software, which came pre-installed on their consumer-grade devices, needed to be removed from every system. Logically, many were asking what the intent of the software was and why it needed to be removed.

Read More

Topics: IT Security, Announcements

Video: Intronis Winter Release ‘15 Preview

Posted by Achmad Chadran on Mar 5, 2015 11:42:00 AM

Today we're launching our Winter Release ’15, and the entire Intronis team is juiced. Why? Quite simply because this release delivers the strongest version of the Intronis ECHOplatform to date. From the very outset, we’ve designed this release to help you broaden your client base, expand services for existing clients, and streamline your operations. The feedback from our beta test partners has been extremely positive.

Read More

Topics: IT Security, Virtualization, VMware backup, Hyper-V Backup, Object Level Recovery

Infographic: 5 Tips for Approaching Customers about Cloud Security

Posted by Lindsay Faria on Feb 3, 2015 9:43:00 AM

A key goal of ours here at Intronis is to enable managed service providers to better meet the needs of their small and medium-sized business customers. One topic that comes up consistently as a concern is security.

There are a lot of choices out there when it comes to selecting technology solutions, and evaluating the security and compliance features of cloud solutions can be tricky for SMBs. We know that some customers are less comfortable than others with the concept of the cloud, seeing the term “cloud security” as an oxymoron. For this reason, the idea of approaching customers with these cloud-based solutions can sound like a formidable task.

Read More

Topics: IT Security, Cyber Security

Oh no they didn’t. Security password mistakes to avoid.

Posted by Lindsay Faria on Jan 23, 2015 3:27:23 PM

If you haven’t already checked out the list of “Worst Passwords” released by SplashData earlier this week, you may want to—and soon.

Each year, the company publishes a list of the riskiest passwords, which frighteningly, are also the most common. In an age where we all have countless passwords to keep track of, and more and more of our business continuity depends on the security of our data, it’s more important than ever to make sure we’re not leaving ourselves fully exposed to the risk of having our accounts compromised.

Read More

Topics: IT Security, Cyber Security

IT security best practice: make no assumptions

Posted by Lindsay Faria on Nov 18, 2014 10:00:00 AM

Today, I came across a thought-provoking post from Tony Carothers on the danger of making assumptions when it comes to IT security. The takeaway was simple and straightforward: “Do not assume that because a company has been in business for “x” years, or they are the hottest product on the market, that it is backed by solid security.  That is an assumption that can cost.  Dearly.”

Read More

Topics: IT Security, Partner Support


Follow Intronis