Organized crime or flourishing business…two in the same with the introduction of Crypto Currency. Greg Edwards, CEO at CryptoStopper joins Brian to unpack the evolution of Ransomware and todays current threat landscape.
For more information, you can connect directly with Greg by email gedwards@getcryptostopper.com
Jason Norton, Product Marketing Manager with Vipre, gives Brian a five point checklist for reference when analyzing your cybersecurity posture. Jason gives us some excellent insights on how the different malware threats are getting more sophisticated and working in conjunction along with some good analogies to explain and clarify these evolved threats to your customers.
Topic 1: Should you rely on best practices?
We return to the question of what ARE best practices and how you define them. But more than that, should you be following other peoples’ so-called best practices? Stop leaning on best practices, and experiment!
Related Link:
https://thenextweb.com/growth-quarters/2021/04/01/stop-best-practice-start-experiment/
Topic 2: Distributor Ingram Micro Buys Harmony PSA.
First, do you care? Second, is this a good move? Would you be tempted to a PSA owned by one of your distributors?
Related Links:
https://www.crn.com/news/channel-programs/ingram-micro-acquires-harmony-makes-smb-play-for-cloudblue
Topic 3: Submerged Servers. Like, IN the water.
Last year Microsoft completed a test of sealed server data centers at the bottom of the ocean. But they kep the water on the outside of the tank. Now they’re developing a non-conductive liquid so they can cool servers by submerging them altogether.
Related Link:
Sponsor Memo:
PC Matic — Endpoint Security built on a zero trust philosophy, allowing only trusted applications and blocking all the rest. Light weight, simple to deploy, easy to manage, find out about PC Matic’s unique lead sharing program for MSPs backed by a prime-time national TV campaign. Together, we bring advanced security solutions combined with more than sales enablement … we bring actual leads. Find out more about PC Matic by visiting PCMatic.com/msp/
🙂
Brian catches up with Barb Paluszkiewicz with CDN Technologies to discuss how they use cybersecurity as the cornerstone of their business. Barb is the author of IT Scams: How to Avoid Being Ripped Off and host of KNOW Tech Talk Podcast. Very passionate about her IT Services business, she refers to them as IT Psychics for their customers…anticipating customer vulnerabilities before they happen.
2021 they are completing the CompTIA Security Trust Mark in order to shore up their own cybersecurity processes, practicing what they preach, however also putting themselves in a position of strength when prospecting larger clientele.
Has BYOD made the comeback and here to stay? Neal Bradbury, VP MSP Strategic Partnerships with Barracuda MSP catches up with Brian to discuss post pandemic technology and the escalating cybersecurity challenges that come with it. The adoption of Zero Trust policies with a remote and/or hybrid workforce now looks to be critical when upgrading your customers cybersecurity posture. For more information or to connect with Neal visit the Barracuda MSP page in our Security Solutions Showcase.
Topic 1: Stop Talking About Multicloud and Hybrid Cloud
It’s time to take this seriously and talk about Integration. As always, we take a stab at the terminology used by our industry and ponder about what’s really going on. We all love jargon, but it’s important to dig a little a figure out what’s really being discussed.
Related Link:
Topic 2: Detecting Deef Fake Videos with AI
Scientists developed a clever way to detect deep fakes by analyzing light reflections in the eyes
Related Link:
Book to note: Thinking, Fast and Slow by Daniel Kahneman.
Topic 3: Next Up – Open AI that doesn’t require massive compute power
New AI project can generate convincing text that anyone can use. The makers of Eleuther hope it will be an open source alternative to GPT-3, the well-known language program from OpenAI.
The Eleuther project makes use of distributed computing resources, donated by cloud company CoreWeave as well as Google, through the TensorFlow Research Cloud, an initiative that makes spare computer power available.
Related Link:
https://www.wired.com/story/ai-generate-convincing-text-anyone-use-it/
Book to note: Flash Foresight by Daniel Burrus.
— — —
Sponsor Memo:
Today’s show is brought to you by US!
Please check out Dave’s Business of Tech podcast. Daily five minute podcasts, plus weekly recaps, video, and more. Visit https://businessof.tech.
Also check out Karl’s SMB Community Podcast, a weekly 30-minute interview format with some of the most interesting people in the SMB IT Community. Visit https://smbcommunitypodcast.com.
🙂
John Hammond catches up with Brian to give an update on what the Security Research Team at Huntress is finding out about the attack on Exchange Servers. The issue looks to be more wide spread than originally thought and not targeted attacks. As John calls it ‘a drive by attack’ where the bad actors did wide spread scans across the internet look to locate and exploit as many vulnerabilities as possible. This is definitely a vulnerability that can’t be ignored and needs to be addressed immediately.
John will be presenting at the Huntress HackIT event next week where they will be unpacking and educating MSPs on all forms of cybersecurity from AV to Phishing. Register Here
Tyler Moffitt, Senior Threat Research Analyst with Webroot unpacks Blockchain Technology with Brian and what we should be educating our customers about. How to detect if we have been compromised for crypto mining and some other excellent takeaways, along with a few horror stories as always from Tyler!
For more information from Tyler on Cryptocurrency you can check out his blog at Webroot.com or you can contact them through our Security Solutions Showcase. For more information on Webroot and a free trial of their security layers visit Webroot.com/IoTSSA
Topic 1: Cops and Robots
Move to stop NYC police from using armed robots. Note: The police do not own any armed robots, but they do own some robots. So this is totally a preventive measure. We previously discussed the use of AI and facial recognition by police departments. The question here is, when do we begin the conversation (before or after deployment)?
Related Link:
https://link.wired.com/view/5e3f0a597e553f71453d575ddurk4.17ax/3469246b
Topic 2: Is Bitcoin mining compatible with Singapore’s green initiatives?
Bitcoin mining uses about the same amount electricity as Norway! Now Singapore is questioning whether this non-green factor is consistent with their go-green policies.
Meanwhile . . . Bank of America says there’s no reason to use Bitcoin. Ethereum has more features. And Ethereum is easier to manage if you’re interested in De-Fi (decentralized finance). BofA released a report last week entitled “8 Dirty Little Secrets of Bitcoin.” See the slideshow link below.
Related Links:
https://www.coindesk.com/bank-of-america-defi-potentially-more-disruptive-than-bitcoin
https://www.thinkadvisor.com/2021/03/22/8-dirty-little-secrets-of-bitcoin-bofa-securities/
Topic 3: Tech Data-Synnex merger – Does this matter to IT consultants?
Tech distributors Synnex and Tech Data are merging. Karl is surprised this took so long. But, in the big picture, does this affect you?
SaaS companies have been taking distributors (and partners) out of the equation for many years. The cloud is moving servers into data centers, who frequently bypass distributors. Cloud services are more effectively sold by Sherweb, AppRiver, Intermedia, Pax8, etc.
Were you surprised? Give us your feedback.
Related Links:
ChannelE2E Announcement re: Synnex / Tech Data Merger https://www.channele2e.com/investors/private-equity/synnex-tech-data-merge/
CRN Slideshow re: D&H Response to Synnex / Tech Data Merger https://www.crn.com/slide-shows/channel-programs/d-h-co-presidents-on-standing-out-amid-the-tech-data-synnex-merger-we-are-like-evolution-versus-revolution-
— — —
Sponsor Memo –
Are you still using on-prem file servers and VPNs to share files with remote workers? Egnyte is a business class cloud sharing solution that works more like your on-prem server than other solutions. With a security first approach to file sharing and collaboration, Egnyte offers multiple options for sharing files and collecting files from outside sources. And do it all addressing data governance and compliance. Want to learn more? Check out Egnyte.com/msp, and when you do, tell them we sent you.
🙂
As vaccinations ramp up and we look positively to the near future, there are many conversations around the work force dynamic moving forward and will business be adopting a Hybrid structure. The answer is an overwhelming yes as many companies have already made changes to office environments and adopted the model.
Brian catches up with Phil Burnett, CISO with High Wire Networks, Mark Glowacz, Director of Partner Success with mailprotector and Vault America, CEO, Zak Karsan to discuss client migration to this new structure and how you can ensure success for both you and your customers.