After pledging to increase security, Google is allowing manufacturers to decide whether or not to enable encryption on Android devics. Android devices are also at risk of receiving spam text messages. Hear about these stories and more, plus hear from a special guest in this week's edition of IT Rewind!

IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Is Data on Your New Lollipop Android Device Encrypted? Maybe Not

InfoWorld, @infoworld, Jeremy Kirk, @Jeremy_Kirk

Android Users Spammed with Fake Amazon Gift Card Offers

Network World, @NetworkWorld, Joab Jackson, @Joab_Jackson


New Continuum Content:

10-Minute Guide: How to Measure Help Desk Success


Keeping tabs on the efficiency of your help desk is an essential component of customer service today. Continuum partner Bryan Sullo at Clocktower Technology Services knows this well – and he recently shared his evaluation process and best practices with us!

To help other MSPs grade their help desk solutions, we’ve worked together to compile this helpful guide - it’s a quick read, and has some great information designed to get you thinking about how best to evaluate your help desk. Download now to get started! Download the eBook»

Continuum's Must-Read Blog Post This Week

The Threat the FBI’s Internet Crime Complaint Center (IC3) Wants You to Know About:


In a recent public service announcement, the FBI’s Internet Crime Complaint Center (IC3) identified a global scam all small-to-medium-sized businesses should especially be aware of, Business Email Compromises (BECs)

Last year saw an influx of BECs, a startling trend that the FBI predicts will increase with more victims and higher total dollar loss in 2015. Read more »

What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

No net neutrality:

         Republicans' "Internet Freedom Act" Would Wipe out Net Neutrality
         Ars Technica@arstechnica, Jon Brodkin, 

FREAK Attack:

        FREAK Attack: How to Keep Your Code Secure
        Network World, @NetworkWorldBill Weinberg

RELATED: URGENT: New FREAK Attack Exposes yet Another SSL/TSL Vulnerability

Apple pay fraud:

         Fraudsters Use Apple Pay to Exploit Stolen Payment Card Data
         MSPmentor@mspmentor, Jim Lippie, @jimlippie



Ben:  Hey everyone and welcome back for another edition of IT Rewind. Before we get to the big stories of the week, I want to take some time to introduce our new blog campaign for the month of March. As you know, in February we talked about “showing the love” whether it was to your clients and employees or to your own business by taking advantage of opportunities and resources. Well, this month, we’re riding with the St. Patrick’s Day hype. Keep an eye out for the hash tag LuckyMSP on social throughout the month, as well as blogs and videos at

On to the news.

After pledging to increase security around personal data last September, Google is apparently leaving it up to the manufacturer when it comes to turning encryption on or off. When the encryption is turned on, which Google had claimed would be the default; devices running the latest version of Android will automatically encrypt personal data. The reason for leaving this decision up to the manufacturers is unclear, although it is suspected that some devices simply won’t operate as well when the encryption is switched on. Motorola’s Moto E and Samsung’s S6 are two examples of devices that do not have encryption on by default.

Android users are being spammed with text messages promising free Amazing gift cards. Instead of going on a shopping spree, the unsuspecting users are being infected with malware that delivers spam to everyone in their contact list. The worm is being called “The Gazon Threat” and have reportedly already affected more than 4,000 Android phones in North America alone. If you feel you may have been infected, you can remove the malware by using the standard Android uninstall utility.

Alright. We've got a special guest, I’d like to now welcome Jim Lippie onto the set. Jim welcome thanks for joining me here.

Jim: Absolutely, thank you.

Ben: Jim,  you're going to be one of our speakers at Navigate 2015 which you should all be signed up for and hyped up for. If you're not, get on that. Why don't you tell everyone a little bit about what you're going to be talking about at Navigate.

Jim: Sure. Absolutely, we're going to be talking about cloud strategy and specifically desktop as a service. So, as a lot of providers out there know, desktop as a service is a new solution out there that, if you're not providing it right now, you should. A lot of small businesses out there are starting to ask questions of their managed service providers. You know, talk to me about desktop as a service. Talk to me about how I can go to the cloud and have an effective cloud environment. Desktop as a service is a great way to do that. So, we're going to talk about the ideal types of prospects for desktop as a service or DaaS, we're going to talk about how to make that solution profitable for service providers, and ultimately, the best ways to sell and market to those prospects. 

Ben: Great, that sounds awesome and we're all excited to be down at Navigate. Again, if you have registered, keep your eye out and make sure you check off Jim Lippie's breakout session down at Navigate, you're not going to want to miss it. If you haven't registered yet, what are you waiting for? Get online and get that done. 

We’re all out of time on this week’s edition of IT Rewind but remember, you can always find us on Twitter, Instagram and Vine at FollowContinuum, as well as on Facebook, LinkedIn, Google Plus and YouTube.

Thanks again to Jim Lippie for joining us. 

You all take it easy. 


Want to join Jim Lippie at Navigate 2015? Register today!