Managed Services Provider Sued by Customer After Phishing Attack

Managed Services Provider Sued by Customer After Phishing Attack

Boardman Molded Products is an Ohio based manufacturing company who has filed a lawsuit against Involta, MSP (their Managed Services Provider) after a phishing scam. Based on reports, access was gained to one of Boardman’s internal email accounts and used to...
One Cyber Incident – Three Possible Outcomes

One Cyber Incident – Three Possible Outcomes

Scenario #1: A dental practice manager arrives at the office and starts up her computer. Her screen flashes a notice that the system has been locked and demands a ransom of $4,900 to provide the key to access the data. She panics – patients will be arriving in...
Managed Service Provider vs. Managed Security Services Provider

Managed Service Provider vs. Managed Security Services Provider

You care about the security of your business and the data of your customers, and you know how important it is to work with security operations providers you can trust. It can be hard to understand the difference between MSSPs and MSPs. As a busy professional, you know...
State Of Cybersecurity In 2020

State Of Cybersecurity In 2020

To keep your company safe from cyber criminals, it is important to become at least as knowledgeable as the perpetrators in the best practices of system security. Smarter is always better, but the latest security threats evolve so quickly that it becomes extremely...
5 Tips to Prevent Cyber Threats in Schools

5 Tips to Prevent Cyber Threats in Schools

Latest estimates for 2019 showed that security firms had discovered ransomware in at least 1,039 schools throughout the United States by the end of 2019. Surely some attacks went undiscovered and unreported, so the actual number is higher. It’s not hard to...
3 Steps to Secure Email

3 Steps to Secure Email

Email, the great security hole of all IT. We need it, most of our users (if not all) have access. It remains a top threat vector for the bad actors. Think about it, many ransomware attacks start with an email. Whaling and spear phishing, email, compromised...