Two billion user logs leaked by smart home vendor

The leak, which apparently has yet to be plugged, exposes a range of very specific data about users. A Chinese smart home solutions provider has been leaking billions of logs from devices managed via the company’s cloud platform, exposing a range of sensitive information about their users. The database – which was found sitting an … More Two billion user logs leaked by smart home vendor

More signs that MSPs must master cybersecurity

Is it worth evolving to become a Managed Security and Service Provider (MSSP)?  The business case seems clear for MSP cybersecurity mastery, but how do you tell when an idea’s time has come? Well, if the volume of stories about Managed Service Providers (MSPs) facing increasingly advanced security threats is any indication, then the time … More More signs that MSPs must master cybersecurity

Concerns about data breaches hitting all-time high

Organizations from various industries across the globe are increasingly hip to the magnitude of the problem posed by data breaches, with 44% of them feeling “very” or “extremely” vulnerable to data threats, according to some of the key takeaways from the global edition of Thales’ 2018 Data Threat Report. This is a sharp increase from 30% … More Concerns about data breaches hitting all-time high

Cloud security policy: The questions you need to ask

What would your reaction be to someone who told you that “The Cloud” is so secure you don’t need to do anything else to protect your data? I would hope that your reaction would be somewhere between the RCA Dog head tilt and Dramatic Chipmunk. But from anecdotes I’ve been hearing, this gem of very questionable advice is … More Cloud security policy: The questions you need to ask

Cloud services: What to consider when migrating your infrastructure

I can barely remember the last time I installed a physical server at a company. These days, most companies have switched the majority of their services and information over to cloud services. There are many reasons for this, ranging from cost to practicalities — like trying to avoid buying hardware that will later become obsolete or … More Cloud services: What to consider when migrating your infrastructure

Is it safe to store corporate information on Google Drive (or similar services)?

When it comes to storing a company’s confidential information and/or backing it up, various questions tend to come up with regards to the location where this storage will take place. Some companies choose to manage everything for themselves, providing remote access so their employees can look it up whenever they need it. Others, however, have … More Is it safe to store corporate information on Google Drive (or similar services)?

ESET protects against Petya and WannaCry ransomware!

ESET Stops WannaCryptor, WannaCry and EternalBlue! Use our free tool to make sure Windows vulnerabilities are patched. What is Petya ransomware? On June 27, 2017, a ransomware attack known as Petya(detected by ESET as Win32/Diskcoder.C Trojan) began spreading rapidly around the globe. The Petya malware attacks a computer’s MBR (master boot record), a key part of the … More ESET protects against Petya and WannaCry ransomware!