One of the biggest recurring themes at this year’s DattoCon event was ransomware, the insidious malware that encrypts your customers’ files and asks them to pay hefty fees – to cybercriminals – to get their data back! George Anderson, product marketing director at Webroot shared some sobering stats and insights on the negative impacts of ransomware.
This MSP migrated a nonprofit customer to a new encryption solution for its mobile devices.
One of the best — and often missed — opportunities for increasing your monthly recurring revenue is adding Unified Communications-as-a-Service (UCaaS) to your managed services offering.
This managed services provider is increasing its average project revenue by 25 percent by becoming a security expert.
While Amazon Echo has steadily gained popularity over the last two years, the upcoming launch of Google Home will likely propel the adoption of smart devices even further in the home. And why not?
Dear? Is that a deer? Legacy Planning – Preparing for the Unexpected. What to do now?
Recently, I wrote about the continuing threat Windows users face. Despite the major advances Microsoft has made in terms of increased security safeguards available in the latest release, Windows 10, there are millions of PCs still running older versions of the popular operating system which are highly vulnerable and susceptible to external threats. Of the many flavors of Windows still widely used, Windows 7 remains the most popular version of the operating system and where cyber criminals continue to focus much of their efforts.
Big Data. It’s among the most pressing challenges — and opportunities — for today’s solution providers. Enterprise data, be it structured in databases and enterprise applications or unstructured textual data from documents (including contracts, letters, emails, newsfeeds, websites, and more) or videos and images, contains a wealth of content that, if searched and analyzed with cognitive intelligence, can deliver valuable insights for the customers you serve.
Cryptographic keys truly could be called the keys to an organization’s digital kingdom and that’s why they must be protected, both at rest and in use. Hardware security modules (HSMs) were created to do just that. HSMs act as both a locked box and a secure management platform for cryptographic keys — because the fact is, however powerful and flexible a crypto system may be a breach of cryptographic keys destroys its integrity. Consequently, HSMs have become the default foundation of security for any modern crypto system.
Technology influencers at small businesses are less than satisfied with the current state of IT at their companies. The most recent findings from Insight Enterprises’ Intelligent Technology Index show that 47 percent of respondents at small businesses give their current IT infrastructure a grade of C+ on average, and say their current technology is a hindrance to incorporating or adopting new technologies.
Our gift card service is designed to help you generate new revenue, increase exposure of your brand, and manage gift card sales for one store or an entire chain.
Begin producing professional photo IDs in minutes – with no software expertise required. Ideal for small to mid-sized organizations, the Zebra QuikCard ID Solution contains everything needed for fast set-up, including a feature-rich Zebra ZXP Series 3™ full-color, single-sided or dual-sided card printer and CardStudio software with built-in templates.
Something as simple as a credit card terminal can make payments acceptance more meaningful. Even better, VARS, ISOs and Merchants can add value to their customers and local communities by supporting charitable giving. So we’re pleased to introduce DonateWiseNow – a revolutionary technology that enables micro-donations at the point of sale.
There are misconceptions about the safety of data stored in cloud-based applications such as Office 365, Salesforce and Google Apps. As a Managed Service Provider, it is imperative that you ensure any of your clients who use these applications that their critical cloud business data stays as safe as it would be on-prem.
Crypto ransomware has come a long way over the past 2½ years and no single solution can stop it 100% of the time. But the right recovery and mitigation strategies can help MSPs keep businesses a step ahead of this virulent threat and ensure their clients are effectively protected.
In addition to being recognized worldwide as a small business guru, Michael Gerber is known for his straight talk. And he’s eager for solution provider owners to be candid with themselves and embrace their reality as well. In a recent interview with Business Solutions President Jim Roddy, Gerber said, “Until the straight talk happens, until somebody pulls the chain, until somebody says something that strikes (VARs and MSPs) so deeply that they can't avoid it or ignore it any longer, nothing's going to change for them.
2015 was another record year for cybercrime, during which more malware and malicious IPs, websites, and mobile apps were discovered than in any previous year. It will come as no surprise that the cybercrime ecosystem continues to thrive, given new innovations and little in the way of risk for those who choose to participate. At Webroot, we believe it is possible to effectively protect enterprises and users, but only by understanding your adversary and the techniques they employ for their attacks.