Resources

Blog

INFOGRAPHIC: How to Protect Your Data from Email Phishing Attacks

Responding to a sender, clicking on a link, or downloading a file that may not be trustworthy can lead to data corruption, leaked confidential information, and infected devices or networks. View this infographic to see tips for protecting against phishing attacks.
Blog

Security Awareness: The Groundwork of Cybersecurity Culture

It’s a big world out there, and cybercriminals know you don’t have time for everything. A common fallacy is that they’re lurking in dark basements, bending their brands to maximum capacity to create highly sophisticated exploits that blow any current security system out of the water. More often than not, they’re not. Criminal hackers go after the low hanging fruit and try the easy road before...
Blog

Are MSPs Right for Me?

Figure out if MSPs are right for your organization. What are the risks and rewards of managed service providers?
Case Study

Fortra and Rg19/Load Make Managed IT Easier for Seco Tools

Based in Fagersta, Sweden, Seco Tools AB is one of the world’s largest providers of comprehensive metal cutting solutions for milling, stationary tools, hole-making, and tooling equipment. Seco partners with nearby Rg19/ Load, a managed service provider (MSP), for advanced server monitoring solutions that enable fast response to issues that could disrupt business. The Challenge Fast Implementation...
Blog

The DDoS Deception You Need to Know About

A denial-of-service attack is any attempt to interrupt or inflict downtime upon IT systems, but a basic DoS threat is smaller in scale than its DDoS counterpart. With the former, the influx of traffic may come from a single source, while in a DDoS attack, traffic comes from numerous sources – making it more difficult to deal with.
Blog

How “Smash and Grab” Compromises IBM i

During an audit a few years ago, I revealed to the client’s security team that corporate payroll information on every employee, including the CEO, was being archived in an output queue (called PAYROLL) for weeks at a time. Due to poor configuration, this information was accessible to every employee.
Blog

What is the Value of SIEM?

As is often the case in the technology industry, the details surrounding security information and event management can be a little unclear. While vendors may offer solutions of varying complexity, there is still a basic idea behind most SIEM products…
Case Study

Halcyon Helps Computacenter Deliver Efficient Managed Services

Computacenter is Europe’s leading independent provider of IT infrastructure services. They offer consulting services as well as implementation and operation services for networks and data center infrastructures on or off client premises and in the cloud.
Blog

Modern RMM Tools for MSPs

Where managed services providers once delivered self-service and after-hours support for beleaguered IT teams, most have now evolved to offer remote monitoring and hosting. But has their technology been keeping pace?