Reporting from Fortinet 2019 in Orlando – I’m delighted to introduce Exclusive Networks, a global distribution company focused on cyber security with great success in Europe and other geos.
At the end of the recent security round table webinar we hosted, we discussed qualified talent. I had a few interesting twists in that conversation.
Before we get into the good stuff – I want to give a shout out to Microsoft 365 Nation contributor Dana Epp and his community involvement. With his well-earned successes already in-hand, Epp has never lost his community commitment and has been a security MVP at Microsoft for over ten years.
In a recent webinar where we held a security round-table with contributors Dana Epp and Michael Fraser, we discussed double authentication. We were able to put book ends on this conversation from 15+ years ago, when Epp pioneered some of this technology with his Vancouver, B.C.-based security ISV called Scorpion Software.
Sometimes MSPs need to step outside – literally – and see what the weather is like. Its all too easy to go inward focused on security setting, filters and the such. A real worldism is in order with Winter hitting hard in much of the US. As I write this, my hometown of Seattle is under warning for a weekend Snowmageddon and the Central US is just coming out of a polar vortex.
Road warriors meet mobile security!
I received a text from my carrier AT&T about its Mobile Encryption app for my Android Mobile phone. The idea is to create a private VPN tunnel when you are on a public WiFi system.
By Fortinet | January 14, 2019
This is a summary of an article that first appeared in SecurityWeek on December 07, 2018.
Digital devices and infrastructures continue to be woven deeper into every aspect of our lives, whether through connected homes, cars, and mobile devices, or by expanding their role in business, government, and even critical infrastructure. One outcome of this is that the stakes in the ongoing battle between cybercriminals and security professionals continues to rise. We are no longer just looking at a cyber breach impacting an organization’s reputation and bottom line. Now and into the future, there is a real potential for a successful cyberattack to disrupt interconnected economies, shut down essential services, or even result in physical harm.
By Anthony Giandomenico | January 14, 2019
Malware is becoming increasingly destructive. Below is a short history of this trend, along with steps organizations can take to combat it.
(This byline originally appeared in SC Media as a bylined article.)
We begin with Mirai that, in the summer of 2016, was responsible for the largest DDoS attack in history. It was built using millions of vulnerable IoT devices and then used to bring down a large chunk of the internet. This began a new ransomware trend where, rather than having to break in and encrypt devices without being detected, which could take weeks to accomplish, automated botnets comprised of hijacked IoT devices executed DDoS-based ransom attacks. Swarms of independent yet centrally controlled devices with no designated user, and often with no OS to patch or update, were especially difficult to combat.
By Lior Cohen | January 10, 2019
Migration to cloud-based compute and services platforms has allowed organizations to quickly adapt to the global transition to a digital economy. The ability to quickly spin up resources, adopt new applications, and respond in real time to end user and consumer demands allows organizations to compete effectively in today’s new digital marketplace. The result has been astounding. In just a few years, over 80% of enterprises have adopted two or more public cloud infrastructure providers, and nearly two-thirds are using three or more.
By Jon Bove | January 09, 2019
At many organizations, discussions around deploying and managing new IT and cybersecurity solutions are often met with confusion. Many companies, especially in the SMB space, do not have dedicated IT and cybersecurity teams. This means technical resources are strained when it comes to selecting, deploying, implementing, and securing infrastructure.