SECURITY INSIGHTS FOR VARS AND ISVS

  • It’s important for solutions providers to stay informed of changing trends and the impact they can have on your client – both if they adopt them and if they don’t. Watch these five tech trends with the power to impact your business and your clients.

  • Why do so many businesses allow unfettered access to their networks? You’d be shocked by how often it happens. The truth is: your employees don’t need unrestricted access to all parts of our business. This is why the Principle of Least Privilege (POLP) is one of the most important, if overlooked, aspects of a data security plan.

  • In my previous blog post, Why Healthcare Organizations are Easy Targets for Cybercrime, I discussed various reasons that hospitals and healthcare organizations make desirable and lucrative targets for hackers. In this second installment, I’ll go over how criminals are attacking these organizations, the methods they use, and also what needs to be done to begin to address this dangerous threat.

  • Certain types of cybercrime targets always make headlines. In this two-part series, we’ll get into a pretty serious one: your health, and why hackers are targeting the healthcare industry for profit.

  • When you think of a hacker, do you envision an anti-social, young, hoodie- wearing man in a dark basement? Popularized by Hollywood and mainstream media, this is the image many of us see, although it’s not entirely accurate. These stereotypes teach us to think of hackers only as nefarious individuals who will stop at nothing to wreak unstoppable havoc. However, the reality is that hacking is a variable, diverse, and highly indvidualized practice, and not all hackers are cybercriminals. In fact, some hackers can even help strengthen your digital defenses!

  • Hackers typically fall into three distinct categories: black hat, white hat, and grey hat. Black hats are hackers who violate computer security with malicious intent, while white hats test existing internet infrastructures to find loopholes or bugs in the system, typically to improve security. Grey hats fall somewhere in between, often breaking into systems illegally but without malicious intent. There are also many subtypes of black, white, and grey hat hackers with various means and motives, from the novice script kiddie to the nation-state terrorist.

  • One of the most notable findings to come from the Webroot 2020 Threat Report was the significant rise in the number of active phishing sites over 2019—a 640% rise, to be exact. This reflects a year-over-year rise in active phishing sites, but it’s important to keep this (dangerous) threat in context.

  • Over the last several years, the use of artificial intelligence (AI) and machine learning (ML) has maintained consistent growth among businesses. During our 2017 survey of IT decision makers in the United States and Japan, we discovered that approximately 74% of businesses in both regions were already using some form of AI or ML to protect their organizations from cyber threats. When we checked in with both regions at the end of 2018, 73% of respondents we surveyed reported they planned to use even more AI/ML tools in the following year. For this report, we surveyed 800 IT professionals with cybersecurity decision- making power across the US, UK, Japan, and Australia/New Zealand regions at the end of 2019, and discovered that 96% of respondents now use AI/ML tools in their cybersecurity programs.

  •  

    “One of the things about working in internet technology is nothing lasts forever… [Students] come to me and they say, ‘I want to do something that has an impact 20, 50, or 100 years from now.’ I say well maybe you should compose music because none of this technology stuff is going to be around that long. It all gets replaced.” -Paul Mockapetris, co-inventor of the domain name system (DNS)

     

  • Secure remote access and the cloud are the new normal for today’s business. But traditional access solutions are poor choices when remote users “live” in AWS, Office 365, and the rest of the cloud. This eBook will explain the pros and cons of the three ways remote users can securely access the cloud - direct access, legacy VPN, and Secure Access Service Edge (SASE).

  • As each year winds down, we tend to look at the coming new year with hope and determination. We will get on that treadmill, we will eat less cake, and we will adopt sound security principals. However, the reality is, we change very little from year to year. That is until something happens to shock our systems.

  • Managed IT services are expected to grow at a CAGR (compound annual growth rate) well into the double digits.

  • Whenever I have the chance to do product release briefings, I make sure to ask why and how a product enhancement or new feature came to be. More often than not, the answer is simple enough: our partners were asking for it. Such is the case with Level Platforms’ release of its network audit product, which helps MSPs evaluate and aggregate important network data for use in the selling cycle. By Gennifer Biggs, security, storage, and managed services editor
  • The U.S. Center for Cyber Security says the state of cyber security in the United States has made the nation vulnerable to attacks on its entire infrastructure, from the desktop to the Internet to the national power grid. By Allison Ash, Guidance Software

SECURITY SOLUTIONS

  • SNCCH140 Network 720p HD Fixed Camera Sony's SNC-CH140 is the latest addition to its powerful lineup of network cameras. This dual-stream network HD camera, supporting H.264, MPEG-4, and JPEG compression formats, delivers excellent picture quality in HD resolution at 30 fps.
  • FortiMail In today’s networks, email, instant messaging, and web-based messaging are the most predominant business communication methods. Unfortunately, they have become one of the most common vehicles for proliferating blended threats composed of viruses, worms, spyware and spam. In response, companies have deployed products such as antispam to protect against attacks. Unfortunately, today’s multi-threaded threats can evade point-products like antispam. These blended attacks can negatively affect business productivity, cause business downtime and lead to identity theft.
  • Astaro Security Gateway Astaro Security Gateway integrates complete Network, Web and Mail Security through an intuitive browser-based user interface. The Astaro Unified Threat Management appliance is the most easy-to-use and cost-effective "all-in-one" solution available, working to effectively shield businesses from internet based threats everyday.
  • Kaspersky Business Space Security Provides high-quality protection for corporate information assets from all types of contemporary Internet threats. Kaspersky Business Space Security offers an umbrella of protection to workstations, smartphones, and file servers from all types of computer threats, prevents epidemics of malicious programs, and keeps information secure and fully accessible to users of network resources.
  • Datasheet: PacketSure 7.6 The cornerstone of the Palisade Data Loss Prevention (DLP) suite is the Packet-Sure™ DLP solution. PacketSure™ DLP prevents sensitive and confidential information from leaving data networks, providing an easy-to-install and easy-to-use solution for ensuring regulatory compliance.
  • Datasheet: MailMarshal e10000 The MailMarshal e10000 unifies anti-spam, anti-virus, data leakage prevention and security policy enforcement technologies into a single, easy-to-manage appliance, delivering the best of both software and hardware. It's easy to deploy, provides hardened security and very low administration requirements.
  • Datasheet: Fortinet FortiGate-310B UTM Device The FortiGate-310B raises the bar for mid-size enterprise security devices. Incorporating multiple FortiASIC Network Processors (NP2) for wire-speed firewall/VPN operation, and the FortiASIC content processor (CP) for content inspection acceleration, the FortiGate-310B yields unmatched multi-threat performance across the highest port density of any product in its class.
  • Kaspersky Anti-Virus For Windows Workstation Kaspersky Anti-Virus for Windows Workstations provides centralized protection of workstations on a corporate network and beyond from all kinds of malware, potentially dangerous programs, network attacks and unwanted mail.
  • Datasheet: WatchGuard® XTM 8 Series A new class of performance-driven security. Ideal for main offices/headquarters with up to 5,000 users, the WatchGuard XTM 8 Series has up to 5 Gbps firewall throughput, ten 1-Gb interfaces, and XTM-class security features including full HTTPS inspection, optional URL filtering, anti-spam, anti-virus, and intrusion prevention – no need to compromise on security to meet increasing network demands.
  • MailMarshal SMTP Spam, malware, complex compliance policies, and confidential data leakage are just some of the concerns that keep today's messaging administrators up at night. MailMarshal SMTP takes care of all these issues — and more — providing a single solution for organizations large and small.