Five Cybersecurity Recommendations

Five Cybersecurity Recommendations

IoTSSA
IoTSSA
Five Cybersecurity Recommendations
/

Jason Norton, Product Marketing Manager with Vipre, gives Brian a five point checklist for reference when analyzing your cybersecurity posture. Jason gives us some excellent insights on how the different malware threats are getting more sophisticated and working in conjunction along with some good analogies to explain and clarify these evolved threats to your customers.

IT Psychics

IT Psychics

IoTSSA
IoTSSA
IT Psychics
/

Brian catches up with Barb Paluszkiewicz with CDN Technologies to discuss how they use cybersecurity as the cornerstone of their business. Barb is the author of IT Scams: How to Avoid Being Ripped Off and host of KNOW Tech Talk Podcast. Very passionate about her IT Services business, she refers to them as IT Psychics for their customers…anticipating customer vulnerabilities before they happen.

2021 they are completing the CompTIA Security Trust Mark in order to shore up their own cybersecurity processes, practicing what they preach, however also putting themselves in a position of strength when prospecting larger clientele.

Zero Trust Architecture

Zero Trust Architecture

IoTSSA
IoTSSA
Zero Trust Architecture
/

Has BYOD made the comeback and here to stay? Neal Bradbury, VP MSP Strategic Partnerships with Barracuda MSP catches up with Brian to discuss post pandemic technology and the escalating cybersecurity challenges that come with it. The adoption of Zero Trust policies with a remote and/or hybrid workforce now looks to be critical when upgrading your customers cybersecurity posture. For more information or to connect with Neal visit the Barracuda MSP page in our Security Solutions Showcase.

Exchange Drive By Hack

Exchange Drive By Hack

IoTSSA
IoTSSA
Exchange Drive By Hack
/

John Hammond catches up with Brian to give an update on what the Security Research Team at Huntress is finding out about the attack on Exchange Servers. The issue looks to be more wide spread than originally thought and not targeted attacks. As John calls it ‘a drive by attack’ where the bad actors did wide spread scans across the internet look to locate and exploit as many vulnerabilities as possible. This is definitely a vulnerability that can’t be ignored and needs to be addressed immediately.

John will be presenting at the Huntress HackIT event next week where they will be unpacking and educating MSPs on all forms of cybersecurity from AV to Phishing. Register Here

Blockchain & Crypto Mining

Blockchain & Crypto Mining

IoTSSA
IoTSSA
Blockchain & Crypto Mining
/

Tyler Moffitt, Senior Threat Research Analyst with Webroot unpacks Blockchain Technology with Brian and what we should be educating our customers about. How to detect if we have been compromised for crypto mining and some other excellent takeaways, along with a few horror stories as always from Tyler!

For more information from Tyler on Cryptocurrency you can check out his blog at Webroot.com or you can contact them through our Security Solutions Showcase. For more information on Webroot and a free trial of their security layers visit Webroot.​com/IoTSSA

The Move to Hybrid Work Force

The Move to Hybrid Work Force

IoTSSA
IoTSSA
The Move to Hybrid Work Force
/

As vaccinations ramp up and we look positively to the near future, there are many conversations around the work force dynamic moving forward and will business be adopting a Hybrid structure. The answer is an overwhelming yes as many companies have already made changes to office environments and adopted the model.

Brian catches up with Phil Burnett, CISO with High Wire Networks, Mark Glowacz, Director of Partner Success with mailprotector and Vault America, CEO, Zak Karsan to discuss client migration to this new structure and how you can ensure success for both you and your customers.

Governance, Risk & Compliance

Governance, Risk & Compliance

IoTSSA
IoTSSA
Governance, Risk & Compliance
/

Brian talks risk appetite with James Bowers II, CEO and Chief Security and Information Officer with Input Output. James takes the 10,000 ft. view and breaks down risk, both quantitatively and qualitatively and then gives some good insights on determining where you are at and what really is needed for you to become compliant. In many cases we may already be well on our way.

Cybersecurity Efficiencies

Cybersecurity Efficiencies

IoTSSA
IoTSSA
Cybersecurity Efficiencies
/

There has been a lot of conversation about the explosive growth and awareness this pandemic has created for the IT channel. The elevation of MSPs to trusted business infrastructure advisor. Taking stock of our businesses as we move into 2021, Amy Luby, Head of Global Community with Acronis, Bill Morgan, Regional Sales Manager at Liongard and Jason Norton, Product Marketing Manager at Vipre Security discuss current pain points with Brian. The panel talks addressing the big picture and give some great insights on building an efficient and effective cybersecurity offering.

Cybersecurity Configuration

Cybersecurity Configuration

IoTSSA
IoTSSA
Cybersecurity Configuration
/

Greg Rosenberg, Senior Manager – Sales Engineering with Sophos gives us a clear and structured approach to building out a robust security stack. With Machine Learning and Artificial Intelligence at the crux of our security tools conversations, Greg provides clarity on the difference between the two and how you can adopt and have not only valuable but productive conversations with your clients.

Distribution & Cybersecurity

Distribution & Cybersecurity

IoTSSA
IoTSSA
Distribution & Cybersecurity
/

Covid is certainly driving both change and growth for IT Service Providers. While scaling your business is always exciting, managing that scale is critical to your long-term success.

IT Channel veteran and Vice President of the Cloud Business Unit at D&H Distributing, Jason Bystrak, chats with Brian about the role distribution plays in cybersecurity and how this can help MSPs grow and effectively manage their offerings. Jason talks about their new XaaS (Everything as a Service) business model and how IT Service Providers can leverage this to not only grow their business but immediately increase their cash flow.