Department of Homeland Security: Some IT Consultants weaken Office 365 Security

The DHS has issued a memo essentially stating that some IT consulting firms and Managed IT service providers (MSPs) involved in Office 365 migrations are not properly securing the cloud productivity suite for customers. The statement, from the US-CERT arm of the DHS, represents both a challenge and an opportunity for MSPs and MSSPs. On Read More »

Customers are struggling with lack of visibility & threat detection

threat detection

Six uncomfortable truths Although, more than half of the organizations surveyed were hit by a cyberattack in the last year, a lack of visibility remains high, threat detection is problematic, false alarms cost time and money, according to a new research. The study surveyed over 3,000 IT decision makers at organizations ranging from 100 to Read More »

Threat actors exploiting trust relationships with IT Service Providers

threat-actors-exploiting-trust-relationships-with-IT-service-providers

Most businesses, especially Small-Mid-size Businesses (SMB), outsource their IT to Managed Service Providers (MSP) to manage their network, servers, desktops, peripherals, and A/V needs. Most SMBs expect the MSPs to provide security coverage along with IT Support. Typically, MSPs manage hundreds of networks and provide two shifts of services and maintenance activities. IT Service providers Read More »

Business E-mail Compromise (BEC) Scam $12B in 5 years

Business-E-mail-Compromise-scams

Business E-mail Compromise scams A spear phishing hacking group, working out of the United Kingdom and Nigeria, has been using business email compromise (BEC) scams and have stolen more than $12 million. This group targeted small and midsize businesses from various industry groups such as manufacturers, hotels, universities, cloud service operators, and so on. This Read More »

Reduce Exposure Time: Managed Detection & Response

Q3Threats

Reducing the time an attacker spends in an environment is a key to mitigate the damage they can do. While most Managed Security Services Providers (MSSPs) are adept at responding to security alerts, Managed Detection & Response (MDR) services enhance the ability to track down attackers and eliminate them from an operating environment. The vital Read More »

State Attackers Moving from Stealing Data to Social Meddling

State Attackers Moving from Stealing Data

The new cyber intelligence report expects that the monetary benefits will allure the use of crypto-mining malware and cryptocurrencies by cyber attackers this year. The cyber state attacker force is growing at an alarming rate. New bad actors. Few unexpected nation states are rising in the ranks of sponsored attackers, including spying on thousands of Read More »

9 things you can do for your SMB to avoid a data breach

Data Breach Attack

You can never really tell if your business is going to be hacked. Hacking a large enterprise needs  specialized skills. Guess, who will the average skilled hackers go after. They are looking for weaknesses and will pounce when found. If you are not doing any of these nine things, you’re definitely are at higher risk of Read More »

Q3 Threats Report from McAfee Labs

Q3Threats

Cyberthreats and security incidents continue to claim the top headlines, keeping cybersecurity the top topic in our minds. The McAfee® Labs Threats Report: September 2017 takes a look back at WannaCry, its impact, and how it exploited not only technical vulnerabilities, but business processes. Additionally, report looks at how threat hunting is performed in organizations Read More »

Cybersecurity attacks on Cloud

cloud defense

Cybersecurity attacks on Cloud-based user accounts spiked 300 percent in 2017 compared to the same period last year, according to latest edition of Microsoft’s Security Intelligence Report. Heading the list of vulnerabilities are all the usual suspects: Weak, guessable passwords, and poor password management, followed by targeted phishing attacks and breaches of third-party services. Here Read More »