MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

VIDEO: Quantum Cryptology Could End Hacking: IT Rewind Episode 50

Posted September 11, 2015by Ben Barker

Wish there were a way to end hacking as we know it? Well, quantum cryptology may be the answer. Meanwhile a Russian cybercriminal team is hijacking satellite-based Internet connections. To hear more, just click play!

IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Does Quantum Cryptology Offer Hack-Proof Security?

InfoWorld, @infoworld, JD Sartain, @JDSartain

Malvertising Campaigns up 325 Percent This Year: Report

Network World, @NetworkWorld, Lucian Constantin, @lconstantin

 

Continuum's Must-Read Blog Post This Week

3 Things Small Businesses Expect From Their IT Providers

 

The IT services market is a unique one, and the SMB niche within it is even further refined. Small and medium-sized businesses have far fewer resources (and minimal manpower) when compared to their enterprise counterparts — and traditionally, these restrictions have prevented smaller organizations from gaining access to emerging technologies and infrastructure solutions.

However, the advent of SaaS (Software-as-a-Service) solutions and the cloud have turned this notion on its head — and today, the SMB IT services market is booming... Read More»


What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Bad habits of IT:

         12 Bad Habits That Slow IT to a Crawl
         InfoWorld@infoworld, Bob Lewis, @ITCatalysts

Musical scares:

        Musical Chairs Campaign Found Deploying New Gh0st RAT Variant
       ThreatPost, @threatpost, Chris Brook

Ashley Madison disaster:

         Ashley Madison Coding Blunder Made Over 11 Million Passwords Easy to Crack
         ITworld, @ITworldLucian Constantin, @lconstantin

 

Transcription

Welp we did it. Through laughter and tears, ups and downs, good stories and bad, we’ve reached IT Rewind episode 50. Being the 50th episode I decided it was only fair that we invite a very special guest on to the show. It’s someone who actually conceptualized and created this program. Please everyone welcome… one year ago me!

Hey there one year ago me, how are you?

Im great how are you?

Good, good, hey you know what? Why don’t you host the show today?

Really?

Yeah go for it!

Well All right. IT Rewind episode 50 starts right now! Hey wait; did the Patriots win the Super Bowl? 

Quantum cryptology could end hacking, as we know it. Sounds pretty good, right? Well, although the idea to end hacking is a no-brainer, the methods that quantum cryptology uses to carry out this idea are anything but simple. According to HERO-KAZU SOO-KEE-MOTO, Tobshiba has developed the world’s fastest quantum key distribution prototype. The prototype uses light particles that are transferred through a custom-made fiber-optic cable independent to the Internet. Any attempt at a hack will result in an alteration of the quantum state and would be immediately detectable. To try to understand the concept behind quantum cryptology a little bit better, check out the full blog on InfoWorld linked below.

Epic Turla, a group of Russian cybercriminal is hijacking satellite-based Internet connections in order to hide their servers as they target governmental, diplomatic, military, educational and research organizations. The group has been active for at least eight years and is know for using highly sophisticated malware on both Windows and Linux operating systems.

Navigate 2015 is just around the corner. Like, seriously, it’s happening soon. We hope you’re just as excited as we are. Get in on the conversation by taking to social media and using the #nav15 and #vegas

As always, read the full stories that we covered today by clicking on the links below, as well as the featured Continuum blog post of the week.

Of course, you can always find us on Twitter, Instagram and Vine at FollowContinuum, as well as on Facebook, LinkedIn, Google Plus, Spiceworks and YouTube. 

Take it easy.

.

 Use your BDR solution as a way to attract clients!

Webinar How To Use BDR Solutions To Attract High-Quality Clients, Boost Sales And Add Profitable Recurring Revenue Streams

Ben is a graduate of Emerson College and a huge Boston sports fan.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus