Filtered by Topic: 'cybersecurity-risk-management'

Why Improving Incident Response Times is the Key to Preventing Loss

We’ve all heard the phrase “time is money,” but when it comes to security incident responses, lost time isn’t just lost revenue — it can also mean a loss of new business, loss of existing customers, loss of critical data, and a loss of brand reputation. In fact, the inability to respond to email and other cyberattacks is resulting in billions of dollars of losses each year for affected businesses.

... Read more
| Author Chris Crellin of Barracuda MSP, tagged in cybersecurity risk management, IT security, email security

Modular Malware Attacks Grow in Frequency

Although it is not a new threat, modular malware is quickly increasing in frequency. Since the start of 2019, Barracuda Labs have identified more than 150,000 unique malicious files. Modular malware is malware with an even more dangerous twist. The robust and evasive attacks are launched in stages, adapting its tactics by analyzing the target’s environment and defenses.

... Read more
| Author Chris Crellin of Barracuda MSP, tagged in malware, cybersecurity risk management, IT security

Protecting your SMB Customers from Tax Scams

 The April 15 filing deadline is looming, and so far, the 2019 tax season has been a lively one. Businesses and individual filers alike have been struggling to understand the full ramifications of the significant changes made to the tax code in 2018 under the Tax Cuts and Jobs Act of 2017. Additionally, a government shutdown threw a monkey wrench into the IRS’ ability to process tax returns and issue refunds.

... Read more
| Author Chris Crellin of Barracuda MSP, tagged in cybersecurity risk management, IT security

Cast A Wider Protection Net with Phishing Education

The Anti-Phishing Working Group reports that phishing attacks continue to increase every quarter, showing up most frequently in the payment, financial, and webmail sectors. Attackers are also increasingly targeting Software-as-a-Service (SaaS) applications and webmail providers. As a result, anti-phishing solution providers have reported activation rate increases over the past year that range from double-digit to quadruple-digit growth.

... Read more
| Author Chris Crellin of Barracuda MSP, tagged in cybersecurity risk management

Expert Advice On Adding Cybersecurity To Your MSP Business Plan

Over the past year, cybersecurity has hit the headlines regularly, from the alleged Russian hack of the U.S. presidential election to corporate and Department of Defense security breaches. Equifax is just one story, and, with 145.5 million people affected, the one that resonates most with the person on the street.

... Read more
| Author Gary Pica, tagged in msp sales, msp business plan, cybersecurity risk management

Where To Host Data: 3 Factors For MSPs To Consider

Should you build, lease or outsource your data center?

Five years ago, the prevailing wisdom was that, given a choice between building a new data center and using a hosted service, the former option was the smarter move. Even Gartner favored this approach, stating that the cost of renting rack space in a hosted data center was doubling every two years.

... Read more
| Author Chris Crellin, tagged in IT service, cybersecurity risk management

2 Smart Ways to Protect Your Customers From Phishing Attacks

One of the most common ways cybercriminals dump malware payloads onto your customers’ networks is via phishing attacks sent through email. Are you doing everything you can to stop this threat?

Whether cyber criminals are seeking passwords, credit cards, or other sensitive information, the fastest and easiest way for them to get past security defenses is by recruiting your customers’ employees to do some of the legwork. More than 90 percent of these types of attacks, called phishing attacks, come in the form of email. It could appear to be an email from a bank, for example, warning the recipient about the need to update their information. Or, it could be a message from a carrier company informing the recipient about an unclaimed package.

... Read more
| Author Chris Crellin of Intronis, tagged in cybersecurity risk management

Subscribe To TruMethods Blog

Discover everything you need to know about becoming a top MSP.