5 Factors for Evaluating an RMM Tool for the Modern MSP

Author(s):

Nisha Balajee, Product Marketer, ManageEngine

RMM Solutions for MPS

Managed Service Providers (MSPs) are becoming increasingly important in the IT management industry. The role of an MSP does not just stop with monitoring, managing, and maintaining the IT services of their clients; it extends to keeping a close watch on everyday IT developments and proactively securing clients’ IT networks against cyberthreats. To balance all … Read more

Credentials: Check and Protect

Author(s):

Alex Haynes, CISO, Cheshire Datasystems Ltd.

Protect Credentials from Breaches

Today, breaches continue unabated at the same alarming rate to which we have grown accustomed. More than 36 billion records were exposed in 2020 alone and that’s only counting those we know about. The real figure will rise far higher. The rate of these data leaks is so frequent that it is hard to track … Read more

Proving a Negative

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

KBA and Data Breaches

Proving there is a “you” has never been easier; proving you are the only you, not so much. We learned in math class in high school that you cannot prove a negative. Or to be more precise, we learned that you cannot solve a negative proof. As a result, in math and logic, we spend … Read more

How to Protect Yourself and Your Data from Privacy Invasion Both On and Offline

Author(s):

James Keenan, Automation and Anonymity Evangelist, Smartproxy

Protect Yourself and Your Data from Privacy Invasion Both On and Offline

American author Joseph Heller once said that “You’re not paranoid if they’re really after you” add to this “and they are using technology to do so” and then you will have today’s reality. Protecting yourself from Big Brother is becoming increasingly necessary as governments become more invasive and smarter in their use of technology. This is … Read more

Data Manipulation Attacks And How To Counter Them

Author(s):

Liza Brooke, ,

Data Manipulation Attacks

The major threat of cyber crime has spread all over the United States, including both public and private sectors. Cybersecurity experts are always warning that hackers and bad actors plan to manipulate all major fields. Indeed, data manipulation attacks will target financial, healthcare, and government data. However, the worst part is that the leading industries … Read more

Ransomware: Harbinger of the Future

Author(s):

Scott Blough | Associate Professor of Criminal Justice & Security Studies at Tiffin University, ,

Ransomware

The recent spate of ransomware attacks on Texas municipalities is a harbinger for the future of cyber-crime. In fact, according to various news sources, as of August 23rd, 2019, at least 22 municipalities in Texas have been affected by this recent ransomware outbreak. Although not all of those affected have gone public, there have been … Read more

The Importance of Protected Digital Assets

Author(s):

Frankie Wallace, ,

Digital Assets

A significant number of your digital assets, whether personal or professional, are now digital in this current age. The transfer of business practices, records, and even storefronts from a mostly physical world to a digital plain has developed rapidly over the last couple decades. Because of this, we are increasingly concerned about the security of … Read more