What lengths would you go to to protect client data from the most dastardly of cyber threats? In a previous edition of Would You Rather, we learned that 73% of respondents would prefer to get hit with a shovel than with CryptoLocker. Ouch! Would you endure physical pain to prevent your customers from becoming the latest victims of malware or phishing schemes? What would you do to avoid data loss or a data breach? Find out in this cyber security edition of MSP Would You Rather!
DID YOU KNOW? According to the Hill, in 2014, the FBI determined the ransomware had infected 234,000 computers and accumulated $27 million in payments. Since then, ransomware has only grown with variants such as CryptoWall, CryptoWall 2.0, CryptoWall 3.0 and the recent CryptoWall 4.0.
DID YOU KNOW? A recent Symantec report found that at least 317 million new malicious programs were generated last year, with around 1 million new malware threats released daily.
You can't completely forego patching when it helps protect you against viruses, threats, and any unwanted exposure of user or machine information, but is too much of a good thing a bad thing? Given the Patch Tuesday Outlook mess that occurred last week around the KB 3114409 update, blindly deploying patches is unwise.
DID YOU KNOW? According to IBM's "2014 Cyber Security Intelligence Index," 95% of all security incidents involve human error, with email phishing acting as the number one contributor.
Check out this list of IT certifications for your techs to pursue in 2016!
Proactively overseeing a firewall means using management tools to monitor application, web content and user filtering. A good firewall solution will equip you with tools that allow you to continually see what's happening within a client's network.
OK, so this one's just more fun than anything. We all know hackers have termites in their smiles.
Although service providers are not held responsible in the event of a credit card breach, you still need to prove to the necessary clients that your data management, security and retention standards are PCI compliant. Do you have their backs? Find out how to help your clients become and remain PCI compliant!
What does it take to actually manage a backup and disaster recovery (BDR) solution? Check out our infographic!
DID YOU KNOW? The only way to recover files corrupted by CryptoWall 4.0 is by paying the ransom or restoring backed up data. You can't deliver data loss prevention without offering backup and disaster recovery (BDR) services.
So how'd you stack up against your peers? Did any results surprise you? Tell us all about it in the comments section below!
By Lily Teplow
By Lily Teplow
By Brian Downey