BSM-SMB BSM-SMB

DattoCon 2016 Day 2 Highlights – Defeating Ransomware And Selling VoIP
DattoCon 2016 Day 2 Highlights – Defeating Ransomware And Selling VoIP

One of the biggest recurring themes at this year’s DattoCon event was ransomware, the insidious malware that encrypts your customers’ files and asks them to pay hefty fees – to cybercriminals – to get their data back! George Anderson, product marketing director at Webroot shared some sobering stats and insights on the negative impacts of ransomware.

More Featured SMB Articles

SMB MAGAZINE ARTICLES

More SMB Magazine Articles

PREMIUM SMB CONTENT

  • Bringing Google Home To Work
    Bringing Google Home To Work

    While Amazon Echo has steadily gained popularity over the last two years, the upcoming launch of Google Home will likely propel the adoption of smart devices even further in the home. And why not?

  • Preparing For The Unexpected
    Preparing For The Unexpected

    Dear? Is that a deer?  Legacy Planning – Preparing for the Unexpected.  What to do now?

  • Exploiting Windows Vulnerabilities Shows No Sign Of Slowing: The 6 Major Threats To Watch
    Exploiting Windows Vulnerabilities Shows No Sign Of Slowing: The 6 Major Threats To Watch

    Recently, I wrote about the continuing threat Windows users face. Despite the major advances Microsoft has made in terms of increased security safeguards available in the latest release, Windows 10, there are millions of PCs still running older versions of the popular operating system which are highly vulnerable and susceptible to external threats. Of the many flavors of Windows still widely used, Windows 7 remains the most popular version of the operating system and where cyber criminals continue to focus much of their efforts.

  • Uncovering Business Insights Through Cognitive Search
    Uncovering Business Insights Through Cognitive Search

    Big Data. It’s among the most pressing challenges — and opportunities — for today’s solution providers. Enterprise data, be it structured in databases and enterprise applications or unstructured textual data from documents (including contracts, letters, emails, newsfeeds, websites, and more) or videos and images, contains a wealth of content that, if searched and analyzed with cognitive intelligence, can deliver valuable insights for the customers you serve.

  • How To Overcome HSM Cost Objections
    How To Overcome HSM Cost Objections

    Cryptographic keys truly could be called the keys to an organization’s digital kingdom and that’s why they must be protected, both at rest and in use. Hardware security modules (HSMs) were created to do just that. HSMs act as both a locked box and a secure management platform for cryptographic keys — because the fact is, however powerful and flexible a crypto system may be a breach of cryptographic keys destroys its integrity. Consequently, HSMs have become the default foundation of security for any modern crypto system.

More Premium Content

SMB HEADLINES

  • Small Business Tech Leaders Give Companies A “C Plus” For Current IT Infrastructure

    Technology influencers at small businesses are less than satisfied with the current state of IT at their companies. The most recent findings from Insight Enterprises’ Intelligent Technology Index show that 47 percent of respondents at small businesses give their current IT infrastructure a grade of C+ on average, and say their current technology is a hindrance to incorporating or adopting new technologies.

More SMB Headlines

SMB PRODUCTS

  • MercuryGift
    MercuryGift

    Our gift card service is designed to help you generate new revenue, increase exposure of your brand, and manage gift card sales for one store or an entire chain.

  • Zebra QuikCard Solutions Bundles
    Zebra QuikCard Solutions Bundles

    Begin producing professional photo IDs in minutes – with no software expertise required. Ideal for small to mid-sized organizations, the Zebra QuikCard ID Solution contains everything needed for fast set-up, including a feature-rich Zebra ZXP Series 3™ full-color, single-sided or dual-sided card printer and CardStudio software with built-in templates.

  • DonateWiseNow ®
    DonateWiseNow ®

    Something as simple as a credit card terminal can make payments acceptance more meaningful. Even better, VARS, ISOs and Merchants can add value to their customers and local communities by supporting charitable giving. So we’re pleased to introduce DonateWiseNow – a revolutionary technology that enables micro-donations at the point of sale.

More SMB Products

SMB MULTIMEDIA

  • Downtime, Deletions & Security Breaches: Why Your Customers' SaaS Data Could Be At Risk
    Downtime, Deletions & Security Breaches: Why Your Customers' SaaS Data Could Be At Risk

    There are misconceptions about the safety of data stored in cloud-based applications such as Office 365, Salesforce and Google Apps. As a Managed Service Provider, it is imperative that you ensure any of your clients who use these applications that their critical cloud business data stays as safe as it would be on-prem.

  • Crypto Ransomware: Fighting A Real Problem With Real Solutions
    Crypto Ransomware: Fighting A Real Problem With Real Solutions

    Crypto ransomware has come a long way over the past 2½ years and no single solution can stop it 100% of the time. But the right recovery and mitigation strategies can help MSPs keep businesses a step ahead of this virulent threat and ensure their clients are effectively protected.

  • E-Myth Author Gerber Sounds Wake-Up Call For VAR, MSP Owners
    E-Myth Author Gerber Sounds Wake-Up Call For VAR, MSP Owners

    In addition to being recognized worldwide as a small business guru, Michael Gerber is known for his straight talk. And he’s eager for solution provider owners to be candid with themselves and embrace their reality as well. In a recent interview with Business Solutions President Jim Roddy, Gerber said, “Until the straight talk happens, until somebody pulls the chain, until somebody says something that strikes (VARs and MSPs) so deeply that they can't avoid it or ignore it any longer, nothing's going to change for them.

  • Webroot 2016 Threat Briefing Webinar
    Webroot 2016 Threat Briefing Webinar

    2015 was another record year for cybercrime, during which more malware and malicious IPs, websites, and mobile apps were discovered than in any previous year. It will come as no surprise that the cybercrime ecosystem continues to thrive, given new innovations and little in the way of risk for those who choose to participate. At Webroot, we believe it is possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they employ for their attacks.

More SMB Multimedia