MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

VIDEO: Malware Attacks are Targeting the End User: IT Rewind Episode 57

Posted November 6, 2015by Ben Barker

VIDEO: Malware Attacks are Targeting the End User: IT Rewind Episode 57

Hackers are switching their attention from company servers to end users. Meanwhile, Microsoft is considering moving up its ban on SHA-1 certificates. To hear more, just click play!

IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Microsoft Follows Mozilla in Considering Early Ban on SHA-1 Certificates

InfoWorld, @infoworld, John Ribeiro, @Johnribeiro

Malware Threat Comes Full Circle to Focus Again on End Users

eWeek, @eWEEKNews, Wayne Rash, @wrash


Continuum's Must-Read Blog Post This Week

What Does It Take to Actually Manage a Backup and Disaster Recovery (BDR) Solution? [INFOGRAPHIC]

Backup and Disaster Recovery is a critical offering in any MSP portfolio today. Data is playing an increasingly-important role in decision making processes, and compliance, retention and regulatory requirements are becoming more restrictive across a number of key verticals and industries. View the infographic »


What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Continuum adds PCI compliance:

         Continuum Adds PCI Compliance Module to Network Assessment Tool
         MSPmentor, @mspmentor, Dan Kobialka

Apple battles back:

       Apple Wages Battle to Keep App Store Malware-Free
       InfoWorld, @infoworld, Jeremy Kirk

Dark debate:

         Same Rhetoric Permeates Going Dark Encryption Debate
         Threatpost, @threatpost, Mike Mimoso, @Mike_Mimoso

 

Transcription

Hey everyone and welcome to this week’s edition of IT Rewind. In today’s episode, Microsoft considers an early ban on SHA-1 certificates, and Malware threats are once again focusing on end users. Hear more about these stories and more right now on IT Rewind! 


Microsoft may be following the measures taken by Mozilla, and advance the blocking of the SHA-1 SSL certificates. The initial plan was for Windows to block the SHA-1 algorithm starting on January 1st, 2017, but that date may be moved up after some recent advances in attacks. Google, Microsoft and Mozilla announced that their browsers would stop accepting SHA-1 SSL certs after researchers found that a forged certificate with the same SHA-1 has as a legitimate one could be created. This forged certificate tricked users into interacting with spoofed sites and compromising their devices.


For the past couple of years, cyber-attacks have been focused on servers and not so much on endpoints. However, according to researchers at the SINET Security Technology Conference, large-scale attacks, like the one on Target, have lead companies to begin encrypting their data and taking extra measures to protect it. So, as business-critical data has become more difficult to obtain, hackers have re-focused their efforts back toward the end users. This is not to say that there are no longer server-oriented attacks, but rather that the attacks on end users are increasing because they are more likely to be successful. The main factor in the shift of focus is that attackers are getting better at social engineering. It is becoming increasingly difficult to distinguish a legitimate email from one that is spoofed. Researchers suggest that companies need to have more realistic Cybersecurity training in place for their employees and that the only time improved security measured seemed to be taken seriously was AFTER end users had become victims.


Take the time to educate your clients on the importance of proper employee security measures. Even if your server is unbreakable, one simple slip up by an employee could lead to a nightmare for your business.


That’s all the time that we have for this week’s episode of IT Rewind, As always, read the full stories that we covered today and other tech stories by clicking on the links below. Also, make sure you check out the Continuum featured blog post of the week. This week we’ve got an awesome infographic for you to check out. Find out just how much managing your own BDR solution is costing you…


Of course, you can always find us on Twitter, Instagram and Vine at FollowContinuum, as well as on Facebook, LinkedIn, Spiceworks and YouTube. We’re also new to Periscope, so check us out on there as well.


Take it easy.

 

The MDM opportunity is out there. Are you taking advantage?

MDM-Is-Calling-Does-Your-Business-Have-an-Answer

Ben is a graduate of Emerson College and a huge Boston sports fan.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus