CentraComm announced today that CRN®, a brand of The Channel Company, has named CentraComm to its 2017 Managed Service Provider (MSP) 500 list in the Managed Security 100 category. This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of…
Below is information on a new tech support fraud that is evolving in the market place. Please listen, be aware and make your staff aware of situations like this. There is a new scam you need to watch out for. In the last few years, online service providers like Google, Yahoo and Facebook have started to…
Prediction 2: Trusted Partner Attacks
Breaking in through the front door isn’t always the best option as it tends to be be well defended. The same is true in cyber attacks. A head on assault is expected, but companies rely on a plethora of technology partners and often communicate with them through trusted digital channels. History suggests that enterprises aren’t doing enough to ensure that trusted partners maintain their security to the same standards that would be demanded if those services were delivered internally.
In the past we have seen this with the Target breach which occurred when Fazio Mechanical, and HVAC vendor was compromised. Likewise, the OPM breach began with a compromise at KeyPoint Government Solutions. Compromised partner networks aren’t always used to directly access another network but can also play an indirect role in a broader attack. For example, attackers that ultimately targeted JPMorgan Chase, Scottrade and E-Trade for money laundering also compromised G2..
Prediction 3: Ransomware 2.0 Goes Corporate
Ransomware has managed to hit a sweet spot. Users are all too willing to begrudgingly pay an expensive but not excessive ransom in exchange for the returnof their precious data.
Even the FBI are recommending that it’s easier to pay than fight. The wildly profitable CryptoLocker has attracted many clones since it was largely knocked offline following Operation Tovar.Many of these clones, including more popular variants such as CryptoWall and TorrentLocker largely followed the proven formula but we’re starting to see variations such as ransomware focused on Linux and mobile platforms.
The former is especially important as it’s more likely to impact the websites and code repositories of enterprises, who in our experience are also very willing to pay up rather than risk losing critical intellectual property. Expect ransomware to become increasingly corporate focused in 2016 and as it does, enterprises won’t get away with paying consumer rates…
Live Educational Webcast – Register Today!
Cyber security is now a topic of discussion at the majority of board meetings, according to a recent NYSE/Veracode survey*. It is no longer just an IT issue, a policy or compliance issue – it is a corporate risk issue. Forrester Inc., states that CEOs are now mainly held responsible for data breaches – a shift from it solely being the responsibility of the CISO. According to them, any lapses will cost executives their job**. The stakes are very high and getting it wrong has significant consequences, including:
Brand damage due to customer loss
Loss of competitive advantage due to corporate espionage
High cost of responding to a breach
How prepared is your organization to handle a security breach and discuss this in the boardroom?
Join Kevin Peterson, CISSP, Director of Security & Network Transformation for Zscaler Inc., for a compelling webcast that will address cyber security priorities being discussed at the boardroom level, including..
With the advent of the cloud, the role of MPLS in network architecture is changing significantly. Hybrid WANs are the cutting edge of network design, incorporating the security and protective features of MPLS with the flexibility and mobility aspects of SaaS and other cloud applications. Hybrid WANs provide consistent and high-quality network performance regardless of user or device location. By capitalizing on the key elements of traditional and cloud infrastructure, companies can control their costs by tailoring network design to their business needs, rather than settling for a one-size-fits all arrangement.
To discover more Read the full White paper, commissioned by Verizon and Zscaler featuring research by Gartner.
GET THE WHITEPAPER NOW!!