Tag: ransomware

Food Supply
The role of MSPs in food supply chain cybersecurity

The role of MSPs in food supply chain cybersecurity

Food and cybersecurity seem like very different topics. When we think of our favorite potato chips or steaks to sizzle on the grill, ransomware isn’t the first thing that comes to mind. However, the food supply chain is under increasing...

/ March 7, 2024
threats
A SOC’s view on 2024 cybersecurity trends

A SOC’s view on 2024 cybersecurity trends

In the world of cybersecurity, threats are constantly evolving. Therefore, by throwing a spotlight on 2024 cyber trends, while considering what occurred in 2023, we can adapt our defenses and anticipate new emerging threats. Artificial intelligence (AI) will play a...

/ March 5, 2024
Five healthcare cybersecurity trends to monitor in 2024

Five healthcare cybersecurity trends to monitor in 2024

We’ve looked at the cybersecurity trends in store for 2024, but trends will differ by discipline in the months ahead. For instance, industrial settings have their own set of vulnerabilities, as do finance, education, government, and healthcare. Hackers especially covet...

/ February 5, 2024
2024 forecasted cybersecurity trends

2024 forecasted cybersecurity trends

The new year always brings a panoply of possibilities and promises. No one knows the future, so it becomes a blank canvas upon which we can all project our aspirations and whims. However, the future can also be full of...

/ January 9, 2024
Beyond the horizon: Growth of cyberattacks in the 2010s

Beyond the horizon: Growth of cyberattacks in the 2010s

As part of our 5-part series on the evolution of cybersecurity, check out our fourth article below that covers IoT devices and vulnerabilities to Bitcoin-driven ransomware in the 2010s. During the 2000s, we saw the growing arms race between security...

/ January 2, 2024
A look back at the top cybersecurity trends of 2023

A look back at the top cybersecurity trends of 2023

December is the time when we pause and reflect on the past year. Keeping with the mantra that the past is a prologue, looking at what occurred may help us understand and prepare for what is coming. This week, we’re...

/ December 21, 2023
Swifties can pose cyber risks

Swifties can pose cyber risks

If you are like me, the whole Taylor Swift-Travis Kelce romance isn’t keeping you up at night. Taylor Swift can be an economic boom to cities where she tours, but she can also be an unintentional cyber risk to her legions...

/ December 8, 2023
Scattered Spider spins a troublesome web

Scattered Spider spins a troublesome web

The Itsy-Bitsy Spider may have crawled up the waterspout, but the Scattered Spider could be crawling into your email box. CISA is sounding the alarm about Scattered Spider and the havoc it can wreak. The CISA bulletin says: “Scattered Spider...

/ November 30, 2023
Protecting your customers’ data in the age of ransomware

Protecting your customers’ data in the age of ransomware

There is a cybersecurity paradox in many organizations that MSPs should consider when working with prospects and existing clients. Most companies see cyber threats as their top concern and believe they have implemented sufficient protection and best practices to protect...

/ November 20, 2023
Shields Up
Shields up: How MSPs can advance cybersecurity with cutting-edge technologies

Shields up: How MSPs can advance cybersecurity with cutting-edge technologies

“Bottoms up” is a good-natured toast or nudge to get one to finish their drink. The Cybersecurity and Infrastructure Security Agency (CISA) is introducing a good-natured nudge to get organizations to finish their resiliency called “Shields Up!” You probably won’t...

/ November 16, 2023