Hackers are switching their attention from company servers to end users. Meanwhile, Microsoft is considering moving up its ban on SHA-1 certificates. To hear more, just click play!

IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Microsoft Follows Mozilla in Considering Early Ban on SHA-1 Certificates

InfoWorld, @infoworld, John Ribeiro, @Johnribeiro

Malware Threat Comes Full Circle to Focus Again on End Users

eWeek, @eWEEKNews, Wayne Rash, @wrash

Continuum's Must-Read Blog Post This Week

What Does It Take to Actually Manage a Backup and Disaster Recovery (BDR) Solution? [INFOGRAPHIC]

Backup and Disaster Recovery is a critical offering in any MSP portfolio today. Data is playing an increasingly-important role in decision making processes, and compliance, retention and regulatory requirements are becoming more restrictive across a number of key verticals and industries. View the infographic »

What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Continuum adds PCI compliance:

         Continuum Adds PCI Compliance Module to Network Assessment Tool
         MSPmentor, @mspmentor, Dan Kobialka

Apple battles back:

       Apple Wages Battle to Keep App Store Malware-Free
       InfoWorld, @infoworld, Jeremy Kirk

Dark debate:

         Same Rhetoric Permeates Going Dark Encryption Debate
         Threatpost, @threatpost, Mike Mimoso, @Mike_Mimoso



Hey everyone and welcome to this week’s edition of IT Rewind. In today’s episode, Microsoft considers an early ban on SHA-1 certificates, and Malware threats are once again focusing on end users. Hear more about these stories and more right now on IT Rewind! 

Microsoft may be following the measures taken by Mozilla, and advance the blocking of the SHA-1 SSL certificates. The initial plan was for Windows to block the SHA-1 algorithm starting on January 1st, 2017, but that date may be moved up after some recent advances in attacks. Google, Microsoft and Mozilla announced that their browsers would stop accepting SHA-1 SSL certs after researchers found that a forged certificate with the same SHA-1 has as a legitimate one could be created. This forged certificate tricked users into interacting with spoofed sites and compromising their devices.

For the past couple of years, cyber-attacks have been focused on servers and not so much on endpoints. However, according to researchers at the SINET Security Technology Conference, large-scale attacks, like the one on Target, have lead companies to begin encrypting their data and taking extra measures to protect it. So, as business-critical data has become more difficult to obtain, hackers have re-focused their efforts back toward the end users. This is not to say that there are no longer server-oriented attacks, but rather that the attacks on end users are increasing because they are more likely to be successful. The main factor in the shift of focus is that attackers are getting better at social engineering. It is becoming increasingly difficult to distinguish a legitimate email from one that is spoofed. Researchers suggest that companies need to have more realistic Cybersecurity training in place for their employees and that the only time improved security measured seemed to be taken seriously was AFTER end users had become victims.

Take the time to educate your clients on the importance of proper employee security measures. Even if your server is unbreakable, one simple slip up by an employee could lead to a nightmare for your business.

That’s all the time that we have for this week’s episode of IT Rewind, As always, read the full stories that we covered today and other tech stories by clicking on the links below. Also, make sure you check out the Continuum featured blog post of the week. This week we’ve got an awesome infographic for you to check out. Find out just how much managing your own BDR solution is costing you…

Of course, you can always find us on Twitter, Instagram and Vine at FollowContinuum, as well as on Facebook, LinkedIn, Spiceworks and YouTube. We’re also new to Periscope, so check us out on there as well.

Take it easy.


The MDM opportunity is out there. Are you taking advantage?