Log4j Vulnerability Update – Dec 14, 2021

2021-12-14 Update CryptoStopper security engineers continue to monitor the Log4Shell vulnerability closely. Extensive testing has been completed and we have confirmed no Log4j vulnerabilities exist within the CryptoStopper ecosystem. Ongoing monitoring and testing will continue. Any relevant updates will be posted here.  2021-12-10 Email Notification Sent to Partners A zero-day exploit affecting the popular Apache…
Read More

Left or Right of Boom? Cover All Your Bases with Cybersecurity

Military terminology can be a great descriptor for the various actions and approaches taken in the IT industry. A case in point is what some refer to as the “left of boom” and “right of boom” methodologies in the cybersecurity area, indicating the different ways companies protect their data and business systems. The former refers…
Read More

Constructing a Valued Cybersecurity Bundle

The ultimate defense is a myth. However, the growing anxiety about ransomware, phishing, and other cyberattacks is putting a lot of pressure on MSPs. How do you design the best protection packages for a wide array of clients? Given the shifting business and threat environments, that objective is becoming a bigger challenge every day, yet…
Read More

To Pay or Not to Pay: How Could Ransomware Laws Affect MSPs?

Anything goes in a war. According to technology and security experts, the ongoing battles with cybercriminals are escalating exponentially and are rapidly turning into “no holds barred” situations. According to Cybersecurity Ventures, the cost of ransomware incidents worldwide is expected to top $265 billion by 2031. To business owners −whether tech-savvy or naïve – those…
Read More

The Top 8 Myths About Ransomware

With 24/7 news cycles and an overabundance of social media streams, the flow of information available on the internet is mind-boggling. Unfortunately, the accuracy of the reports, suggestions, and “facts” shared through those forums is questionable, at best. The truth often gets distorted by opinions or through the loss or changing of certain elements of…
Read More

Why Ransomware Protection is the New IT Standard

Cybersecurity is big business today. For the criminal element, hacking and ransomware delivery high-return and relatively low effort activities and the significant rise in revenue is fueling increasingly more aggressive and costly attacks. (more…)
Read More

What Happens When MSPs Get Hit with Ransomware?

The “worst-case” scenario is no longer unexpected in the channel. MSPs are increasingly on the receiving end of the cybersecurity attacks that they spend so much time and money trying to stop for their clients. With so many variables (human error is at the top of that list) and possible entry points for cybercriminals and…
Read More

Cybersecurity Investments Point to New Opportunities for MSPs

The data and network protection market is hot. From the smallest firms to the largest enterprise organizations, businesses need quality cybersecurity support, and most can benefit from a range of other services that MSPs deliver. Researchers suggest that the demand for those mutual IT-related offerings will reach unprecedented levels in the near future. (more…)
Read More

Taking a Cybersecurity Role in a Co-Managed IT Environment

Business is changing. Not only are the SMB clients you support transforming their operations from WFH and hybrid work environments to the adoption of more cloud services, but larger organizations are openly seeking new options. The more than year-long COVID-19 pandemic continues to stretch the already thin resources of many businesses, including those with large…
Read More

WFH is a Prime Environment for Ransomware Attacks

Employees need a safe working environment. Whether on a construction site or sitting in an office, employees need guidance and support to ensure they stay true to workplace procedures and best practices. This is a big concern with the pandemic forcing many businesses to shift – temporarily, if not permanently − to WFH environments. (more…)
Read More