MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

VIDEO: A New Malware Campaign Is Targeting SMBs: IT Rewind Episode 60

Posted December 4, 2015by Ben Barker

A new malware campaign is posing a serious threat to small and mid-sized businesses. Meanwhile, a Chinese cyberthreat group is using Dropbox to compromise systems. To hear more, just click play!

 
 
 
 
 
 
 
 


IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

New Attack Campaign Against SMBs Uses a Botnet to Deliver PoS Malware

CIO, @CIOonline, Lucian Constantin, @lconstantin


Chinese Hacker Group Uses Dropbox for Malware Command and Control

eWeek, @eWEEKNews, Wayne Rash, @wrash


Continuum's Must-Read Blog Post This Week

Don't Abandon Your SLA. Sharpen IT!

Don't abandon your SLA

 

I recently read Joe Panettieri's Channel E2E article which questioned if MSPs should abandon their service level agreements (SLAs). He cites a thesis from TruMethods Owner Gary Pica and CTO Bob Penland, which argues that MSPs should focus less on their SLA guarantees to customers and more on their proactive support and care. The two argue that SLAs are often used to prove how good MSPs are "in reactive mode," which isn't good enough.

Now, I will concede that the principle behind this theory is one I agree with. By offering threat detection and monitoring services, I'm able to reduce the number of tickets that a customer generates, thus avoiding costly downtime and demonstrating that I'm able to expertly prevent problems from developing into huge issues. Also, by maintaining the health of client endpoints, servers and networks, my team is able to deliver faster resolution times that keep clients happy, all while driving our own business costs down. Read more »

 


What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Safer shopping secrets:

         4 Do's and Don'ts for Safer Holiday Computing
         InfoWorld, @infoworld, Roger A. Grimes, @rogeragrimes

The future for MSPs in the UK:

       What Does the Future Hold for UK-Based MSPs?
       MSPmentor, @mspmentor, Dan Kobialka, @dkobialka 

The lastest on ransomware:

         China Blames Criminals for U.S. Government Hack
         CNN, @CNN, Sophia Yan, @sophia_yan
 


Transcription

Hey everyone welcome back to IT Rewind. On today’s episode, the 60th episode of IT Rewind, we’re taking a look at a new attack campaign against SMBs. You’ll hear all about this story and more right now on IT Rewind!

A new malware attack campaign called “Black Atlas” is specifically targeting small and mid-sized businesses. The attackers are re purposing penetration testing tools and breaking into the networks of businesses with weak password practices to infect the systems with malware. The malware is being used to compromise the PoS systems of these small and mid-sized companies in order to acquire payment card details. The attacks have affected businesses around the world, including a healthcare organization in the US that has yet to be named.

Sticking to the subject of cyberthreat groups, a Chinese organization known as “admin@338” is using APIs from Dropbox to hide command and control functions inside an encrypted service. The attack starts out as a phishing attack by using an infected Word document. Once opened, the session begins. The malware sends a file to Dropbox and the command and control system can then control the malware on the infected computer. Currently, the treat exists in Hong Kong, but the attackers could easily turn their attention to the US soon.

That’s all the time that we have for this week’s episode of IT Rewind, As always, read the full stories that we covered today and other tech stories by clicking on the links below.

Of course, you can always find us on Twitter, Instagram and Vine at FollowContinuum. We’re also on Facebook, LinkedIn, Spiceworks, YouTube and Periscope.

Take it easy.

 

Grow your client base! Learn more about MSP marketing!

The-Complete-Guide-to-MSP-Marketing-eBook

 

Ben is a member of Continuum's marketing team. He specializes in blog content as well as video production. Ben is a graduate of Emerson College and a huge Boston sports fan.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus