Skip to content

Rising Attacks on MSPs: Why Small and Medium Sized Businesses Should Think Twice Before Handing Over Control to Managed IT Service Providers

The mid-market businesses of our country are worried about a lot of things. They’re worried about their bottom line, hiring and retaining talent to take their company to the next level and meeting ever-demanding client expectations. That’s what makes the prospect of using a managed IT service provider (MSP) so appealing to these companies. IT… Read More »Rising Attacks on MSPs: Why Small and Medium Sized Businesses Should Think Twice Before Handing Over Control to Managed IT Service Providers

Vendor/Supply Chain CyberSec – Lessons to be learned from the CCH Hack

On Friday, May 3, 2019, Wolters Kluwer CCH, the cloud-based tax division of the Netherlands-based-global information services firm Wolters Kluwer, was notified of an apparent security/data privacy issue by Brian Krebs, the world-famous cybersecurity expert behind KrebsonSecurity. Wolters Kluwer is a global provider of professional information, software solutions, and services for clinicians, nurses, accountants, lawyers, and tax,… Read More »Vendor/Supply Chain CyberSec – Lessons to be learned from the CCH Hack

Cybersecurity Risk, what does a “reasonable” posture entail and who says so?

In one form or another, it is more likely than not that your company is in possession of personal or sensitive data that requires some degree of protection from potential cyber threats. With data breaches seeming to make daily headlines, and hackers developing innovative methods to penetrate cyber defenses, businesses must contemplate what “reasonable” security… Read More »Cybersecurity Risk, what does a “reasonable” posture entail and who says so?

3rd Party Cybersecurity Risk – Literally the Keys to Your Front (and Every Other) Door!

Your organization’s risk surface may be larger than you think. Here is why. Depending on the industry or vertical niche, most businesses today rely on several (if not many) third-party service providers and other vendors to support core business functions. Supply chains are interconnected so just-in-time inventory management hums along seamlessly. The multi-function printers contact… Read More »3rd Party Cybersecurity Risk – Literally the Keys to Your Front (and Every Other) Door!