Cybersecurity Investments Point to New Opportunities for MSPs

The data and network protection market is hot. From the smallest firms to the largest enterprise organizations, businesses need quality cybersecurity support, and most can benefit from a range of other services that MSPs deliver. Researchers suggest that the demand for those mutual IT-related offerings will reach unprecedented levels in the near future.

Continue reading

Taking a Cybersecurity Role in a Co-Managed IT Environment

Business is changing. Not only are the SMB clients you support transforming their operations from WFH and hybrid work environments to the adoption of more cloud services, but larger organizations are openly seeking new options. The more than year-long COVID-19 pandemic continues to stretch the already thin resources of many businesses, including those with large IT departments, and their management teams are looking at all possible relationships.

Continue reading

The Five Most Frightening Forms of Ransomware

No matter how many levels of defense MSPs implement for their business clients, there is virtually no way to stop a carefully planned and executed attack − or prevent a lucky cybercriminal from breaking through your security measures. Email remains a moving target for hackers, and despite an almost endless array of combative tools available to augment data protection, reactive measures rarely impede their efforts. Traditional methods typically notify MSPs only after inflicting the damage.

Continue reading

SonicWall VPN Zero-Day: To disrupt or not to disrupt?

10:15 PM CST Friday 1/22/2021 SonicWall released information that they had been compromised by a zero-day SSL VPN and SMA vulnerability. For MSPs using SonicWall, the options are to disconnect SSL VPN, whitelist VPN users, turn on MFA, or wait for a patch. SonicWall has released little information regarding the vulnerability. SonicWall has said that their own San Jose corporate offices were compromised and that is how they discovered the vulnerability.   


Please see IMPORTANT update below before taking action!


Continue reading

Ransomware: How it Works and How to Protect Against Infection

What Ransomware Delivers

One early morning in May 2017, a nurse walked into her ward. She switched on her computer, ready to log in for the busy day ahead. She checked her emails and noticed an urgent message from IT, stating, “Shut down your computer as soon as you see this message. The hospital has been infected with malicious software.” A sense of panic set in. Hospital IT officials went around to each section and ward in the hospital to ensure all of the computers were shut down. The hospital itself, effectively, was shut down, having to turn patients away.

The hospital in question was one of many organizations, small and large, across the world that had been infected with the ransomware variant, WannaCry. In 2019, over 500 schools in the U.S. were attacked by ransomware. Among the many hospitals hit by ransomware, three had to close their doors to all but critical patients. New ransomware families continue to enter our networks, encrypting our files and documents and causing untold and ongoing damage.  This seemingly intractable position is why we invented CryptoStopper.

This is our story of fighting against a tidal wave and seeing it turn. Ransomware is a sinister force, but with the right approach and tools to augment our anti-ransomware stance, we can take on the global wave of cybercrime with extortion at its core.

Download our Complete Guide to Ransomware to learn more!

Continue reading

Posted in Uncategorized | Tagged