Tag Archives: business security

Avast RMM Platform for MSPs now includes security assessment

Small and medium-sized businesses have just as great a need as large enterprise to keep their data safe and secure. But costly, complex assessment and monitoring solutions are often all that’s available. Starting today, Avast is offering Managed Service Providers (MSPs) a simplified way to perform real-time security assessments and consolidate the data into easy-to-read reports that prescribe solutions for issues. From these reports, MSPs can quickly recommend solutions, take actionable steps to remediate issues, and demonstrate how they are keeping businesses safe and secure – all from the Managed Workplace remote monitoring and management platform (RMM). 

How AI outsmarts cybercriminals

      No Comments on How AI outsmarts cybercriminals

Artificial intelligence (AI) is the hottest new trend that’s been around for years. While that may sound like an oxymoron, there’s a reason the buzz around AI and its subset, machine learning, hasn’t quieted down and is likely to continue for a long time. It’s uniquely critical in our fight against the ever-growing number and variety of cyberthreats and vital to our ability to scan for and remove malware.

Patching could have minimized WannaCry impact, now worst ransomware outbreak in history

WannaCry (AKA WanaCrypt0r, WCry, Wannageddon or another day of cyberinfamy), which marries ransomware with worm-type spread targeted at Microsoft Windows operating systems, is the “the worst ransomware outbreak in history.” But according to Jakub Křoustek, a lead on Avast’s Threat Intelligence team, it could easily have been avoided through proper patch management. The attack, which began on May 12, has cost victims as much as $4 billion.

Cybersecurity Services: Are you getting your money’s worth?

Small and medium-sized businesses (SMBs) are the biggest targets of cybercriminals, and they often don’t have the necessary budgets, people, processes, and products to protect themselves. Because of this, SMBs are increasingly turning their cybersecurity protection over to managed service providers (MSPs). 

Why we (still) need World Backup Day

      No Comments on Why we (still) need World Backup Day

More than 40 years after the invention of the personal computer, it is astounding that we still need World Backup Day. This year’s event, which takes place on March 31st, the day before April Fool’s Day, ‘is a day for people to learn about the increasing role of data in our lives and the importance of regular backups.’ Here’s the key takeaway: You need to regularly back up your data because the chances of losing some or all of that data are high, and getting higher.

After the breach: Putting your cyber house in order

Today’s cybersecurity is good, with most prevention solutions having a 99.9% or higher detection rate for common malware, but once penetrated, identification is usually a case of too little, too late. The mean time to identify (MTTI) a data breach was 201 days, and a mean time to contain (MTTC) was 70 days. In up to 70% of cases, data breaches were detected by third parties.

Cloudy with a chance of malware

      No Comments on Cloudy with a chance of malware

While overall IT budgets are experiencing minimal growth – a compound annual growth rate of 0.9 percent in 2016 (to $3.4 trillion) – the sky is the limit when it comes to cloud: Cloud infrastructure spending will increase 16.2 percent in 2016 to $37.4 billion, with a 5-year CAGR of 13.6 percent to $60.8 billion in 2020. That’ss just the hardware; public cloud services are expected to reach $208 billion in 2016, up from $178 billion in 2015. Gartner attributes the growth to the fact that organizations are saving 14 percent of their budgets as an outcome of public cloud adoption.

A cybersecurity primer

      No Comments on A cybersecurity primer

History teaches us that everything changes, and that’s particularly true when it comes to cybersecurity where a vulnerability, accidental or malicious, can put a business at risk any time, any where. While cybersecurity must address the core functions — Identify, Protect, Detect, Respond and Recover — in a holistic manner, what are the processes, practices, hardware and software that when combined and integrated together can provide effective cybersecurity? The following is not a definitive list, but it does cover the basics required to better secure your information assets.