MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

VIDEO: Nearly Half of Android Devices are Vulnerable to Attacks: IT Rewind Episode 31

Posted March 27, 2015by Ben Barker

ITRewindEpisode31


Nearly 50% of Android device users are vulnerable to attacks. Downloading applications from third-party app stores could put you at risk. Do you think you're safe while surfing the web? Guess again. A recent study shows that a large percentage of the top 1 million websites have vulnerabilities. Hear about these stories and more on this week's edition of IT Rewind!

 

 

IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Android Flaw Puts Personal Data at Risk for Millions

Computer World, @Computerworld, Jeremy Kirk ,@Jeremy_Kirk

One-Fifth of Scanned Sites Have Vulnerabilities, Menlo Security Finds

eWeek, @eWEEKNews, Sean Michael Kerner

 

Continuum's Must-Read Blog Post This Week

Preventative Tech Tips for Cryptolocker

preventativetipsforcyrptolocker

Cryptolocker. We have all heard it mentioned, be it in the back room of the IT closet or over a drink after a long day of remediation. It’s a malicious attack that is not going away, and dare we say it, continues to improve in its method of hijacking and holding computers, networks, and even gaming files ransom for untraceable funds. And when it hits an unprotected network, it is any client’s and IT pro’s worst nightmare.

With that in mind, and a strong, layered approach to network security in place to protect against future attacks, there are also a few additional steps we would like to provide to help secure your client’s environment. Using information provided by Roy Tobin, Threat Research Analyst for Webroot, here is a small guide that can help establish yet another layer of protection put in place against the nasty cryptoware and ransomwares. Read more »


What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Dell danger:

         Dell Support Tool Put PCs at Risk of Malware Infection
         InfoWorld@infoworld, Lucian Constantin, @lconstantin

Don't call it a comeback:

        Will Embedded and Middleware Help Save Blackberry?
        Network World, @NetworkWorld, Jon Gold, @NWWJonGold

The future of the Surface:

         The Future of Microsoft Surface: What to Expect From Surface 3 and Surface pro 4
         ITWorld@ITworld, Mark Hachman, @markhachman

 

Transcription

Hello everybody and welcome back to our beautiful Boston studios for this week’s edition of IT Rewind. Lets see that intro!

We have a couple of big stories to cover today, so lets get right into it.

Take out your mobile device for a minute. Is it an Android? If so, your personal data could be at risk. According to Palo Alto Networks, nearly half of Android devices are vulnerable to an attack that replaces downloaded applications with malicious software. The malware is used to collect sensitive data from the phones that it is installed on. The vulnerability is called “Android Installer Hijacking,” for obvious reasons, and could compromise information such as usernames and passwords. The flaw was discovered in January 2014 and at that time affected close to 90 percent of devices. As of now, that number is down to 49.5 percent, but many devices have not been patched. If you do have an Android device, be very cautious when downloading applications from a third-party app store.

Recent studies by Menlo Security revealed that one-fifth of web domains have known vulnerabilities. 750,000 web domains were scanned and 21 percent of those sites had vulnerabilities including web server and PHP issues. The 750,000 selected web domains came from a list of the top 1 million websites. The report went on to break down the 21 percent of vulnerable sites and showed that 10 percent were running a vulnerable version of PHP while 4 percent had vulnerable web server software. Additionally, 4 percent of sites were serving malware and 1 percent were involved in phishing and botnet activity.

We’re just about out of time for this week’s edition of IT Rewind, but once again, if you haven’t already registered, head on over to www.continuum.net/navigate2015 and book your ticket to this year’s user conference in Las Vegas

As always, remember to read the full stories that we covered today by clicking on the links below. Of course, you can always find us on Twitter, Instagram and Vine at FollowContinuum, as well as on Facebook, LinkedIn, Google Plus, Spiceworks and YouTube.

Take it easy.

 
Protect your clients from mobile madness by offering complete Mobile Device Management!
 
   MDM-Is-Calling-Does-Your-Business-Have-an-Answer

Ben is a member of Continuum's marketing team. He specializes in blog content as well as video production. Ben is a graduate of Emerson College and a huge Boston sports fan.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus