Remove level-up-your-msp
article thumbnail

Oh no! A client failed a pen test. Now what?

Webroot

In a previous post, we talked a bit about what pen testing is and how to use the organizations that provide them to your benefit. Regards, Largest MSP Customer.” When a customer reaches out after failing penetration testing, it can put an MSP on its heels and create unnecessary angst. Review your tools configurations.

article thumbnail

Aw CRUD (Create/Read/Update/Delete): Extended Policy Capabilities in Duo’s API

Duo's Security Blog

Not only will the extension of our Admin API’s capabilities with these policy endpoints allow you to automate policy tasks and save precious time, but engaging with these policy endpoints can also offer you greater security, control, and integration within your environment. Create Spin up multiple policies quickly. Keep an eye out!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Threating hunting: Your best defense against unknown threats

Webroot

Small to medium-sized businesses (SMBs) and managed service providers (MSPs) are especially vulnerable to the stealth efforts of bad actors. With fewer financial resources, a ransomware payment demand could mean the difference between staying in business and closing up shop. Take your security stack to the next level.

article thumbnail

How MSPs Help Small Businesses with Essential Cyber Insurance Cover

Duo's Security Blog

In this blog, we explain why it makes sense for these firms to work with managed service providers (MSPs) to help bolster their security posture and increase their chances of getting cyber liability insurance cover as insurers continue to raise the bar. But what about the firms that sit firmly on the smaller side of the SME spectrum?

article thumbnail

What is Pen Testing and Should You Have a Company that Performs them on Retainer?

Webroot

An MSPs intention is to NOT allow this to happen by putting up the right security posture through layered defenses. But there are ways pen testing organizations can help MSPs. They know how things are set up and are there as more of an audit/report type tester rather than a malicious hacker. But don’t stop there.

article thumbnail

What it means?—?CitrixBleed ransom group woes grow as over 60 credit unions, hospitals…

DoublePulsar

Earlier in the week, the BBC reported that a ‘cyber incident’ (ransomware) at CTS, a legal tech firm (cloud MSP) in the UK, is leaving UK home sales in limbo: Cyber-attack leaves home sales in limbo CTS own Sprout IT as a core brand: Sprout IT ran Netscaler and hadn’t patched it until late. This has since been confirmed by the US Treasury.

article thumbnail

It was a LONG weekend — Here’s the vital info on REvil and Kaseya VSA

Cisco Security

To stay up to date on this attack, please take a look at the Talos response post which is being continually updated. VSA is an MSP software management platform, and is used primarily for monitoring, and the management of endpoints. As you can imagine, it has a very high level of access. Nick Biasini. This is not new.