dcsimg

Why You Should Use OneDrive for Business

This article looks at what Microsoft OneDrive for Business is, and how to govern the features that make up this excellent cloud storage solution. Read the post here: Why You Should Use OneDrive for Business … [Read more...]

Document and Demonstrate Your Value with Reporting

Many MSPs deal with business-owner customers for whom tech is not a core competency. These customers may have trouble understanding and appreciating all the value you deliver as their IT services provider. One way to keep the value of your services front and center is to provide regular reports that document the status of their data protection service. Reporting is also a critical tool for your … [Read more...]

Pandemic Sees DDoS Attacks Jump 524%

With most office workers still working at home, the network has now become the major linkage between employees and their jobs. … [Read more...]

HITRUST Fills in the Blanks for HIPAA and PHI Security

HIPAA carries a lot of weight, but it is merely a set of guidelines that healthcare companies (and technology providers who work with them) must follow when handling Patient Health Information (PHI). For people imagining a team of inspectors showing up unannounced to offices worldwide for a surprise checkup, or to administer a results-oriented audit … The post HITRUST Fills in the Blanks for … [Read more...]

We found yet another phone with pre-installed malware via the Lifeline Assistance program

We have discovered, yet again, another phone model with pre-installed malware provided from the Lifeline Assistance program via Assurance Wireless by Virgin Mobile.  This time, an ANS (American Network Solutions) UL40 running Android OS 7.1.1.   After our writing back in January—”United States government-funded phones come pre-installed with unremovable malware“—we heard … [Read more...]

How to Build a Business Case Proposal for Information Security

Confidential data is at risk, and the threats to data are likely to increase over the next 12-18 months. At present, analytics predict that there is a 40% chance that any organization could fall victim to an insider threat if proper actions are not taken to improve prevention, detection and response capabilities. Why then, do so many security professionals struggle to get budgets approved for … [Read more...]

How to Decide When to Schedule Patching—Part Two

Continuing on our conversation from … [Read more...]

Thycotic Expands Identity Provider Integrations with SCIM Connector 2.0

Washington, D.C., July 8, 2020 — Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 25 of the Fortune 100, today announced the general availability of System for Cross-domain Identity Management (SCIM) Connector 2.0, which allows expanded integrations between identity providers and Secret Server. Many organizations have both privileged … [Read more...]

How and Why Mac Devices Are Used in Companies – Parallels Survey Part 2

Mac can now be found in more than 50% of all companies, showing an upward trend. How did this proliferation come about and why do companies and their employees prefer Mac in growing numbers? Some 1,000 IT professionals, mainly from small and mid-sized enterprises (SMEs), participated in a survey about their company’s usage of Mac. Software developers love Mac The main reason quoted by … [Read more...]

Mac ThiefQuest malware may not be ransomware after all

Editor’s note: The original name for the malware, EvilQuest, has been changed due to a legitimate game of the same name from 2012. The new name, ThiefQuest, is also more fitting for our updated understanding of the malware. The ThiefQuest malware, which was discovered last week, may not actually be ransomware according to new findings. The behaviors that have been documented thus far are … [Read more...]