Category: Cybersecurity

Browse our comprehensive Cybersecurity content to learn how to protect your digital assets against evolving threats. Understand the latest security technologies and practices.

What is Ransomware?
August 17, 2020

What is Ransomware?

Annie Stroud

As a managed service provider (MSP), you know that ransomware attacks are increasing daily. More and more businesses are being crippled by the devastating effects of these attacks and they are showing no signs of slowing down.

Read Now
MSPs Tap MSSPs For Security Services
July 30, 2020

MSPs Tap MSSPs For Security Services

Andrew Burton

According to our latest research, managed service providers (MSPs) rely heavily on managed security service providers (MSSPs) to provide security services to their clients.

Read Now
The Importance of RMM Security
April 28, 2020

The Importance of RMM Security

Chris Brunau

There’s no shortage of cybersecurity threats in today’s world. MSPs have recently been thrust into the crosshairs of threat actors because of unfettered access to their customers’ IT infrastructure and the valuable data within it.

Read Now
Cybersecurity Tips for Working Remotely
April 06, 2020

Cybersecurity Tips for Working Remotely

Ryan Weeks

With the global health crisis forcing people worldwide to work from home, there is increasing evidence that malicious actors are using people’s fear to prey on remote workers. Home networks, actions of family members, and the security of workstations can impact your company’s security.

Read Now
What’s The Difference Between Circuit Switching vs Packet Switching
March 31, 2020

What’s The Difference Between Circuit Switching vs Packet Switching

Chris Brunau

Circuit switching and packet switching are the two main methods of expediting network connections.

Read Now
How Ransomware and HIPAA Compliance Intersect
January 21, 2020

How Ransomware and HIPAA Compliance Intersect

Tobias Geisler Mesevage

Healthcare organizations are an attractive cyber target for ransomware attacks.

Read Now
RMM Security: More Than Just Cloud vs. On-Prem
November 22, 2019

RMM Security: More Than Just Cloud vs. On-Prem

Andrew Burton

When selecting a remote monitoring and management (RMM) solution, there are many considerations. You’ll obviously start with monitoring and management capabilities and integration with the rest of your tech stack.

Read Now
What Is Endpoint Protection?
November 04, 2019

What Is Endpoint Protection?

Tobias Geisler Mesevage

Endpoint protection systems detect malicious activity and protect secure networks, including servers, desktops and mobile devices from attack

Read Now
What Is A SIM Port Hack?
October 21, 2019

What Is A SIM Port Hack?

Tobias Geisler Mesevage

A SIM port hack involves a hacker who has convinced your mobile phone carrier to activate your phone number on another device.

Read Now