February 2020 Patch Tuesday Update:  One of the Largest by Vulnerability Count

While January 2020’s “Patch Tuesday” release from Microsoft wasn’t large in size, it had a few “high profile” vulnerabilities that demanded immediate attention. February is a different story.  At the time the patches were released, Microsoft reported only one of the vulnerabilities had an active exploit against it. There are a whopping 99 individual vulnerabilities fixed across operating … [Read more...]

How to Move up the Automation Maturity Model—Part 3: Beyond the Basics

<p>In previous blogs in this series, I discussed how partners typically fit in four main automation maturity categories. The categories include partners who aren’t interested in automating, partners who are interested but aren’t sure how to start, partners who have started the journey towards automation, and partners who automate anything they can.</p> <p>If you haven’t read … [Read more...]

What is Network Discovery?

<p>In the modern digital age, companies are relying on larger networks than ever before. But these networks aren’t just bigger; they’re also more dynamic. With an influx of BYOD policies, SaaS applications, and a myriad of other digital transformation initiatives, it has become more difficult for managed services providers (MSPs) to gain visibility into their customers’ network topology: … [Read more...]

How to Stay Safe from Office Macro-Based Malware with Email Security  

<p>Microsoft Office macros have been spreading malware since the late '90s, ranging from Melissa to well-known ransomware applications such as Locky or the Dridex banking malware. However, as users learned how to combat these threats, this type of attack fell out of favor with hackers.&nbsp;</p> Read More … [Read more...]

Common BYOD Challenges

<p>For many people in today’s increasingly digital landscape, “going to work” has become synonymous with “going to the living room.” <a href="https://www.flexjobs.com/blog/post/flexjobs-gwa-report-remote-growth/&q…; target="_blank">Remote work has grown a staggering 159%</a> over the past 12 years. Read More … [Read more...]

7 Reasons to Partner with a Specialized Security Provider

<p>Over the past few years, cybersecurity has grown more complex. As individuals and businesses grow increasingly connected, there are more opportunities than ever for cybercriminals to attack. As both businesses and consumers continue to learn about current cybersecurity dangers, MSPs will increasingly be expected to enhance their own security capabilities.</p> Read More … [Read more...]

Who hates shopping (for backup software)?

<p>Shopping isn’t everyone’s favorite activity. And even those who enjoy shopping would most likely rather be perusing something fun—like a new car, new favorite pizza place, or new gaming system—rather than something as dull as backup software for your managed services provider (MSP) or business.&nbsp;</p> Read More … [Read more...]

How Does Token-Based Authentication Work?

<p>As a managed services provider (MSP), cybersecurity is never far from your mind. Recent research estimates the damages from cybercrime will reach a startling <a href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-201… trillion per year by 2021, up from $3 trillion in 2015</a>. Read More … [Read more...]

Maze Ransomware: A Threat to a Business’s Security and Reputation

<p>Ransomware began simply—a criminal would send a piece of malware that locked up your system unless you paid them a ransom. If you had a good backup in place, you could revert your system to a known safe state and get back up and running fast. Over time, the industry did a decent job of using strong backup to protect their data and systems, and we saw some decline in this basic level of … [Read more...]

Group Policy Management and Troubleshooting Best Practices

<p>Cybersecurity has defined the tech space over the past decade, and <a href="https://www.solarwindsmsp.com/blog/foresight-2020-5-cybersecurity-predi… don’t anticipate that changing any time soon</a>. It’s likely cybersecurity threats will only get more advanced in 2020 as the digital landscape continues to evolve, and customers will become even more concerned about the … [Read more...]