It’s no secret that a business’ security is one of its most important considerations. It would seem that there is a daily reminder of this unfortunate fact - but it’s even more unfortunate that many people aren’t aware of where many threats can actually come from.
Below, we’ll discuss how some threats start on the inside - as well as what you can do to help stop them.
From the Inside?
Some may be surprised to learn that one of the biggest threats to ...
The Nigelthorn Malware is a Lot Less Friendly than its Namesake
You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.
Nigelthorn’s Method of Attack
The scam works like this; you encounter a link to a fake YouTube video on social media. If the user clicks on this link, they will be asked to download the Nigelify extension from the Chrome ...
What happens when the managed IT services provider you trust to keep your IT infrastructure safe and secure gets hacked? What do you do when your network and servers are compromised in a secondary attack? Unfortunately, attacks on MSPs by local and foreign bad actors are becoming quite common, but there are certain steps only the most experienced and elite MSPs take that separate them from the rest.
Last week, Continuum, a renowned professional services automation (PSA) firm used by many ...
Call it a case of the Mondays, when you arrive at the office and see the calendar reminder about the regional meeting this afternoon. You know it’ll be an hour or two and it probably won’t start on time because Jim and his team who are driving in from Fairfax are going to get lost, again.
If you’ve ever grumbled and thought “can’t they just put the highlights in a memo and let us read it on our own time?” chances are you’ve ...