dcsimg

GDPR—Meeting the 72-hour breach notification period

Beyond the Earth-Moon system, thousands of asteroids known as Near-Earth Objects (NEOs) are known to exist. These rocks periodically cross Earth’s orbit and make a close flyby of Earth. Over the course of millions of years, some even collide with the Earth, causing mass extinctions. Little wonder then why NASA’s Center for Near Earth Object Studies (CNEOS) is dedicated to monitoring the larger … [Read more...]

GDPR—Quick-Win Strategy 4: The “Easy Three” Endpoint Defense Services

This blog is about the “easy three” endpoint defense technologies: Mail protection Web protection Antivirus Read More … [Read more...]

GDPR—Quick-Win Strategy 3: Patch Management, Admin Rights Management, and Full-Disk Encryption

While the General Data Protection Regulation (GDPR) isn’t explicit about all of the actions you must take to protect customer data, there are a few basic technologies you should put in place. Read More … [Read more...]

GDPR—Quick-Win Strategy 2: Mail Protection and Application Whitelisting

Anti-malware solutions can’t completely shoulder the burden of protecting a managed services provider’s (MSP) customers from cyberattacks. Examples abound of antivirus solutions faltering when trying to prevent <insert your chosen very bad thing here>. Cybercriminals have become so much better at slipping malware past defenses to the point where many MSPs now have to perform clean-up … [Read more...]

The Path to MSSP 

<p>Recently, we conducted a survey of more than 400 SMEs and enterprises in the US and UK, addressing their IT security needs and views of their service providers. The results presented huge opportunities for MSPs willing to add the extra S to their acronym and become managed <em>security</em> service providers (MSSPs). With 80% of businesses planning to change their IT security … [Read more...]

Building GDPR Services: Why Onboarding (or Re-Onboarding) Is Critical

Cybercriminal: “Your money or your customer’s network.” (pause) Cybercriminal: “Look bud. I said, your money or your customer’s network.”  Jack: “I'm thinking it over!”   —Hypothetical Jack Benny Radio Program, 28 March, 1948   Read More … [Read more...]

Protecting Web Applications in the World of GDPR

Businesses have embraced both the creation and use of web services and web applications at an astronomical rate. But as many companies—most recently Equifax®—have found out, protecting web services and web applications is serious business. In the case of Equifax, the failure to patch a known vulnerability in the Apache® Struts Framework led to a major data breach. Read More … [Read more...]

GDPR—Quick Win Strategy 1: Deliver Customer Employee Security Training

Managed services providers (MSPs) are a skeptical bunch. Because vendors and channel experts abound, many MSPs and IT service providers tend to tune out content from vendors. If you’re going to try and sell MSPs on an idea, it better be value-driven. And you need to get to the point—fast. Read More … [Read more...]

What Terms You Need to Know to Get Your Business GDPR-Ready 

You’ve got some time before the EU General Data Protection Regulation (GDPR) takes effect. If you haven’t started planning yet, you have until May 25,2018 to get in shape, or you could face fines of up to 4% of your annual turnover. The good news is we have some pertinent information to get you started while you consider your plan of action for readiness. Protecting your customers’ data, … [Read more...]