MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

VIDEO: FBI and DOJ Want Tech Companies to Retain Encrypted Information: IT Rewind Episode 43

Posted July 10, 2015by Ben Barker


The FBI and DOJ want tech companies to retain encrypted information of their clients instead of providing end-to-end encryption. A new Android malware masquerades as a Nintendo game emulator and is tricking users into paying for the harmful application. We cover these stories and more on IT Rewind! Just click play!

Create and Share Your Own "Sad IT Dude" Meme Here!


IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

FBI, DOJ Want Companies to Back off End-To-End Encryption

InfoWorld, @infoworld, Grant Gross, @GrantGross

Android Malware Masquerades as a Nintendo Game Emulator You Have to Pay For

PCWorld, @pcworld, Jeremy Kirk, @Jeremy_Kirk

 

Continuum's Must-Read Blog Post This Week

VIDEO: Escaping the JAWS of IT

Escaping-the-jaws-of-it-4.png 

Have you ever thought to yourself, I wonder what the movie Jaws would be like if it were about a virus and not a shark? So have we. To celebrate Shark Week, we decided to recreate the film's iconic town meeting scene, but with an IT twist. Join us as Chief Information Officer Brody Rhombus struggles to keep his office afloat after a horrifying virus attack endangers the livelihood of his clients' devices. In a role heralded by critics as "an unparalleled display of true acting grit," Glenn Barley reprises his role as Blake Break-Fix (Quint), a down-and-dirty Break-Fix type with a big head and a bad attitude. How will Brody handle this summer's scariest threat? Will the attacks continue? What will become of the end users of Amity Island? Read More»


What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Flash Player fix:

         Emergency Flash Player Updates Fix Vulnerability Used in Widespread Attacks
         CIO@CIOonline, Lucian Constantin, @lconstantin

Summer scam:

        Summer Travel Scam Targets Your Points and Miles
        Network World, @NetworkWorld, Jen A. Miller, @byJenAMiller

Sneaky Samsung:

         Latest DoS Attacks Used Old Protocol for Amplification
         eWeek, @eWEEKNews, Robert Lemos

 

Transcription

Hello and welcome back for another edition of IT Rewind! Now, I know what you’re thinking… Where is our handsome host? Well, we felt like he needed an episode off after you all decided to make a meme out of him last week (show meme). So, I’m Mary McCoy and I’ll be filling in this week with all of the latest news from the world of IT. Lets do this thing.

The FBI and Department of Justice are asking that U.S. tech companies retain access to encrypted information of their customers. The reason for the request is so that law enforcement officials will be able to access the information to investigate crimes and terrorist activity. Retaining access to encrypted customer information would mean that tech companies should no longer provide end-to-end encryption. It has been made clear that these organizations are not looking for encryption back doors that give them direct access to information, but rather that the tech companies themselves retain internal access so that they can comply with court-ordered search warrants

The latest form of Android malware is tricking users into paying for the data-stealing application. The malware, which is being called “Gunpoder” is disguised as a Nintendo emulator and charging unsuspecting users to download the harmful application. Gunpoder is capable of a variety of actions including collecting bookmarks and browser histories, spreading itself via SMS and showing fraudulent advertisements. So, next time you get a hankering to play Mario, you might want to take extra caution that you’re not putting your device at risk.

Before we wrap up I want to remind you that Navigate 2015 is fewer than 80 days away! If you haven’t already booked your ticket, make sure you do so! You won’t want to miss out on our amazing speakers like Verne Harning, Robin Robins and Continuum CEO, Michael George. Head on over to www.continuum.net/navigate2015

That’s all the time we have for this week’s edition of IT Rewind. Ben Barker will be back next week, but I have a feeling ill find my way in front of the camera again sometime soon. In the meantime, lets get social! Find us on Twitter, Instagram and Vine and Follow Continuum as well as on Facebook, LinkedIn, Google Plus, YouTube and Spiceworks! Bye!

 

Three-Steps-to-BDR-Success-White-Paper
 

Ben is a graduate of Emerson College and a huge Boston sports fan.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus