NetStandard attack should make Managed Service Providers sit up and take notice

Credit to Author: Pieter Arntz| Date: Wed, 03 Aug 2022 16:48:37 +0000

The attack on MSP NetStandard reminds us once again that MSPs are a very attractive target for cybercriminals

The post NetStandard attack should make Managed Service Providers sit up and take notice appeared first on Malwarebytes Labs.

Read more

Introducing Malwarebytes Vulnerability Assessment for OneView: How to check for Common Vulnerabilities and Exposures (CVEs)

Credit to Author: Bill Cozens| Date: Tue, 14 Jun 2022 12:38:13 +0000

In this post, we’ll give you a step-by-step on how to complete an Inventory and vulnerability scan in Malwarebytes Vulnerability Assessment for OneView.

The post Introducing Malwarebytes Vulnerability Assessment for OneView: How to check for Common Vulnerabilities and Exposures (CVEs) appeared first on Malwarebytes Labs.

Read more

Serious vulnerabilities found in ITarian software, patches available for SaaS products

Credit to Author: Pieter Arntz| Date: Mon, 13 Jun 2022 12:25:19 +0000

Researchers at DIVD found vulnerabilities in ITarian products and worked with the vendor to develop patches. These patches are now available.

The post Serious vulnerabilities found in ITarian software, patches available for SaaS products appeared first on Malwarebytes Labs.

Read more

Lock and Code S1Ep2: On the challenges of managed service providers

Credit to Author: Malwarebytes Labs| Date: Mon, 16 Mar 2020 15:28:35 +0000

On episode 2 of Lock and Code, we discuss the latest security news, including how to secure remote workers, security conferences cancelled because of coronavirus, and Google Play’s poor performance on stopping malware. Plus, we speak to two MSP representatives on the daily challenges of managing thousands of endpoints.

Categories:

Tags:

(Read more…)

The post Lock and Code S1Ep2: On the challenges of managed service providers appeared first on Malwarebytes Labs.

Read more

Securing the MSP: best practices for vetting cybersecurity vendors

Credit to Author: William Tsing| Date: Wed, 11 Mar 2020 15:44:33 +0000

How do you spot the unicorn cybersecurity vendors amongst the bad apples? We show MSPs the ins and outs of vendor vetting.

Categories:

Tags:

(Read more…)

The post Securing the MSP: best practices for vetting cybersecurity vendors appeared first on Malwarebytes Labs.

Read more

Why managed service providers (MSP) are critical for business continuity

Credit to Author: Jovi Umawing| Date: Mon, 24 Feb 2020 16:00:00 +0000

What many don’t realize is that SMBs need the same level of protection from threats that are usually only afforded to enterprises. Managed service providers (MSPs) are the key to getting the protection and service they need while staying on budget.

Categories:

Tags:

(Read more…)

The post Why managed service providers (MSP) are critical for business continuity appeared first on Malwarebytes Labs.

Read more

Securing the MSP: why they’re their own worst enemy

Credit to Author: William Tsing| Date: Thu, 30 Jan 2020 16:00:00 +0000

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Categories:

Tags:

(Read more…)

The post Securing the MSP: why they’re their own worst enemy appeared first on Malwarebytes Labs.

Read more

Securing the MSP: their own worst enemy

Credit to Author: William Tsing| Date: Thu, 30 Jan 2020 16:00:00 +0000

Behind each cyberattack on the MSP is typically a system left unpatched, asset management undone, security officer not hired, or board who sees investment in security as a cost center rather than a long-term investment.

Categories:

Tags:

(Read more…)

The post Securing the MSP: their own worst enemy appeared first on Malwarebytes Labs.

Read more

Multiplikator für Malware: Wenn MSPs zum Instrument der Cyberkriminellen werden

Credit to Author: Jörg Schindler| Date: Tue, 12 Nov 2019 13:35:57 +0000

Ransomware ist eine starke Waffe der Cyberkriminellen. Und es entwickelt sich ein neuer Trend – die Infizierung von Unternehmen über deren Managed Service Provider. Die jüngsten Opfer allein in den USA: Hunderte von Zahnarztpraxen und Kommunen. Chet Wisniewski, der Forensik und das Vorhersagen von cyberkriminellen Entwicklungen zu seinem Beruf gemacht hat, hatte die Probleme und [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/5Cm-K3yJorc” height=”1″ width=”1″ alt=””/>

Read more

5 tips for building an effective security operations center (SOC)

Credit to Author: Gilad Maayan| Date: Fri, 13 Dec 2019 16:00:00 +0000

A security operations center (SOC) can significantly improve an organization’s security posture, but it’s not a perfect solution and can be challenging to implement. Read on to learn how to clear hurdles and build an effective SOC team.

Categories:

Tags:

(Read more…)

The post 5 tips for building an effective security operations center (SOC) appeared first on Malwarebytes Labs.

Read more