Category: Cybersecurity

How does your MSP’s Team Identify?

How does your MSP’s Team Identify?

As a trusted technology provider and business advisor, your MSP has some serious horsepower. It's why Matt and I are constantly talking about the importance of locking down your own house. You, the IT provider, could wreck livelihoods if something went drastically...

read more
We Need a Federal Privacy Law

We Need a Federal Privacy Law

I was perusing one of my favorite cyber news spots, The Record, and stumbled on this article: Connecticut inches closer to becoming fifth state with data privacy law - The Record by Recorded Future. Privacy laws are a good and crucial step forward, especially because...

read more
Stop Using Magic Links

Stop Using Magic Links

Click here to get a link to login. Magic links are suddenly everywhere, and I simply refuse to accept the logic behind them. Before I rant a bit about why you shouldn't be using them, let's talk through the basic concept behind it: At a high level, magic link...

read more
Will there be a cyber war?

Will there be a cyber war?

As a cyber nerd, my first question when tensions went up in the region was 'what are the cyber implications?' The atrocities happening in Europe are shocking for everyone, and this is certain to be in history books in the same way 1939 is. However, it's different. I'm...

read more
It’s Time: Drop Persistent Remote Access

It’s Time: Drop Persistent Remote Access

Threat actors are using your infrastructure for command and control as a service! When it first became a thing, remote controlling a computer was a thing of magic. So much "how are you doing this?!" Threat actors have caught onto this. Creating one convenient place to...

read more
Built on Divi