dcsimg

How Do Firewalls Work? 

<p>Cyberattacks can be incredibly devastating for businesses, not to mention costly—it’s estimated that in 2017, the cost of <a href="https://www.cnbc.com/2018/02/22/cybercrime-pandemic-may-have-cost-the-w… was nearly $600 billion</a>. Read More … [Read more...]

Domain Controllers Overview

<p><a href="https://www.solarwindsmsp.com/blog/network-authentication-methods&quot; target="_blank">Authentication</a> is an essential function for a computer network, helping ensure that only authorized users have access to the system. As a managed services provider (MSP), authentication is a key element of helping ensure your customers’ data is secure and … [Read more...]

SHA-256 Algorithm Overview

<p>Encryption is a critical part of modern computer security. Read More … [Read more...]

Empower MSP: The Future of Security: Fast, Furious, and Fun

<p>“The technology landscape is changing quickly and the security landscape trying to adapt and keep up,” said Tim Brown, VP of Security, at the beginning of his keynote presentation on day two of Empower MSP, Atlanta. “Security was in the background; it is now in the boardroom as the bad guys continue to evolve and utilize different models to meet their business … [Read more...]

NIST Cybersecurity Framework Overview

<p>Very often managed services providers (MSPs) are responsible for helping to develop information security standards for their customers, as well as setting up their own processes. A comprehensive strategy is crucial for effectively defending against cyber threats. But how can MSPs and other IT professionals be sure that they have covered all the bases?</p> Read More … [Read more...]

Empower MSP Atlanta Day 1 Highlights

<p>Day one of SolarWinds Empower MSP was all about automation and adapting to change to grow your business. We’ve summarized the highlights below and included details on how you can see the presentations (alongside much of the rest of the day’s workshops) on demand!</p> <h3><b>Your Business with Training and Automation—Frank Colletti</b></h3> Read More … [Read more...]

Multi-Tenancy in the Cloud

<p>When advising customers on choosing a <a href="https://www.solarwindsmsp.com/blog?category=721&amp;page=1&quot; target=_blank>cloud computing</a> environment, managed services providers (MSPs) should have a strong understanding of which implementations will best serve customer needs. One key distinction is between the single-tenant cloud and the multitenant … [Read more...]

SQL Injection Attack Examples

<p>Structured query language (SQL) is a standard computer language for creating, editing, and accessing relational databases. Developed by IBM in the 1970s, it’s commonly used by database administrators to run tasks and execute commands.</p> Read More … [Read more...]

Honeypotting Security and Network Considerations

<p>The primary purpose of cybersecurity infrastructure is to keep attackers out. Read More … [Read more...]

Remote Code Execution Overview

<p>As a managed services provider (MSP), your customers rely on you to keep up to date with potential threats to their data and security. These potential threats require MSPs to consider remote code execution (RCE), a network vulnerability that allows hackers to hijack machines in order to wreak havoc. Once machines are hijacked, hackers can deny service to rightful users, steal or destroy … [Read more...]