Load Balancer | What is it and how it works? | Parallels Explains

What is a load balancer? A load balancer is an appliance which could be physical or virtual, and acts as a proxy to distribute network traffic across several servers. Load balancers are utilized to increase capacity (concurrent users) and reliability of applications. Load balancers improve the performance of shared applications and desktops by distributing the network traffic on multiple servers, … [Read more...]

QxSearch hijacker fakes failed installs

Recently, one of the more dominant search hijacker families on our radar has started to display some curious behavior. The family in question is delivered by various Chrome extensions and classified as PUP.Optional.QxSearch because of its description in listings of installed extensions, which tells us that “QxSearch configures your default search settings.” This branch of the search … [Read more...]

Why Balancing Access Controls for Managed File Transfer Matters

If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing file transfers, that means you should lock down access to your secure file transfer tool as tightly as possible, right? Maybe not. … [Read more...]

Phishing Email Uses Google Drive to Get Past Microsoft Security

This week, Threatpost reported on a new spear-phishing attack that uses email sent via Google Drive claiming to be the CEO of the targeted company sharing important information with the recipients.  The email came from Google Drive, but the sender address didn’t match the company’s standard naming convention for email addresses. Because the message was sent by a legitimate email … [Read more...]

Why Email and EFSS are Insecure

FTP (File Transfer Protocol) has been the standard bearer for sending or moving files too large for email. Today, those file transfers contain the lifeblood of an organization and so Secure FTP is now critical. … [Read more...]

“Macs Don’t Get Viruses,” And Other Lies

<p><i></i>You’ve probably heard the phrase, “Macs don’t get viruses.” You may even have said it yourself.&nbsp;</p> <p>Unfortunately, it’s a lie.</p> Read More … [Read more...]

Selling Backup: What Leading MSPs Do Differently

<p>Many managed services providers (MSPs) tell us they have trouble selling backup or data protection to their small-business customers. Too many cost-conscious business owners refuse to listen to the advice of their IT professionals, waving away the risks of downtime and data loss, seeing data protection spend as a cost with little benefit. Others think that if they check the box for “I … [Read more...]

The Hidden Bee infection chain, part 1: the stegano pack

About a year ago, we described the Hidden Bee miner delivered by the Underminer Exploit Kit. Hidden Bee has a complex and multi-layered internal structure that is unusual among cybercrime toolkits, making it an interesting phenomenon on the threat landscape. That’s why we’re dedicating a series of posts to exploring particular elements and updates made during one year of its … [Read more...]

5 common questions about SOC 2 compliance

Organisations that provide tech services and systems to third parties should be familiar with SOC (Service Organization Control) 2.  The framework is designed to ensure that relevant organisations – Cloud computing providers, Software as a Service companies, etc. – process information securely.  Service organisations are usually required to pass a SOC 2 audit in order to partner with or provide … [Read more...]

Thycotic Rises in Seventh Consecutive Year on the Inc. 5000

WASHINGTON, D.C., August 15, 2019 — Thycotic, a provider of privileged access management (PAM) solutions to 10,000 organizations worldwide, including 20 percent of the Fortune 1000, today announced that the company has been named to the Inc. 5000 list of fastest-growing companies for the seventh consecutive year. Inc. magazine recognized Thycotic’s tremendous success and ranked the PAM provider … [Read more...]