MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

VIDEO: Venom Vulnerability Exposes Virtual Machines: IT Rewind Episode 36 - From Mumbai, India!

Posted May 15, 2015by Ben Barker

Screen_Shot_2015-05-15_at_2.37.56_PM.png
A new vulnerability called "Venom" is posing a HUGE threat to unpatched hosting systems. The vulnerability allows attackers to take full control of the compromised environment and make away with critical data. Find out more about Venom on this week's edition of IT Rewind!

 


IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Microsoft Fixes 46 Flaws in Windows, IE, Office, Other Products

Computerworld, @computerworlduk, Lucian Constantin, @lconstantin

VENOM Vulnerability Could Expose Virtual Machines on Unpatched Host Systems

Firstpost, @firstpost

London-Based Geeson Onboarding New Clients with IT Support from Continuum

Continuum, @FollowContinuum

  

Continuum's Must-Read Blog Post This Week

Shatter the Stereotype: 3 Sales Myths Exposed!

Shatter_the_Stereotype-_3_Sales_Myths_Exposed-1.jpg

How would you describe a sales person? Manipulative, annoying and pushy are some of the adjectives that come to mind unfortunately! People often picture the car salesman in a suit talking a mile a minute. In his book, To Sell is Human,bestselling author, Daniel Pink, shatters this misconception, arguing that nearly every person in the world is now in sales. 

Whether you’re selling an idea to your team, listing your skills at an interview or building trust on a service call, you are constantly sharing ideas and information with the intent of changing or molding the minds of those you interact and do business with. That doesn’t make you a duplicitous person. It makes you an influencer. Still, whether it’s you or your customers contributing to its proliferation, the stereotype lingers. Here are the top 3 sales stigmas preventing you from taking your managed IT services business to the next level... Read More»


What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Fake passwords make great passwords:

         The Best Way to Protect Passwords May Be Creating Fake Ones
         InfoWorld@infoworld, Jeremy Kirk, @Jeremy_Kirk

Angler pushing ransomware:

        Angler Exploit Kit Pushing New, Unnamed Ransomware
        Threatpost@threatpost, Brian Donohue, @TheBrianDonohue

Microsoft cracks down:

         Insecure Consumer Routers Compromised to Form 'Self-Sustaining' Botnet
         eWeek@eWEEKNews, Robert Lemos

 

Transcription

HEY THERE AND WELCOME TO CONTINUUM’S NETWORK OPERATIONS CENTER HERE IN MUMBAI INDIA FOR THIS VERY SPECIAL EDITION OF IT REWIND! 

THIS WEEK I DECIDED TO TAKE A TRIP TO OUR NOC IN ORDER TO MEET SOME OF THE TALENTED TECHNICIANS THAT KEEP YOU AND YOUR CLIENTS HUMMING AND HAPPY. IT’S BEEN AN AMAZING TRIP AND IVE MET A LOT OF EXTRAORDINARY PEOPLE. BUT, THERE IS STILL NEWS TO BE COVERED, SO LETS GET TO IT!

MICROSOFT HAS RELEASED ITS LATEST BATCH OF SECURITY PATCHES, THIS ONE CONTAINING FIXES TO 46 FLAWS. THE FLAWS EXISTED IN WINDOWS, INTERNET EXPLORER AND OFFICE AMONG OTHER MICROSOFT PRODUCTS. THE MOST NOTABLE FIXES CAME IN THE FORM OF THREE BULLETINS THAT WERE DEEMED CRITICAL. THESE BULLETINS, MS15-043 THROUGH 045 ADDRESSED REMOTE CODE EXECUTION ISSUES IN WINDOWS, INTERNET EXPLORER, MICROSOFT.NET FRAMEWORK, MICROSOFT LYNC AND SILVERLIGHT. IT’S WORTH NOTING THAT MICROSOFT PLANS TO BEGIN RELEASING UPDATES ONCE THEY ARE READY INSTEAD OF ON A FIXED SCHEDULE. HOWEVER, COMPANIES WILL HAVE THE OPTION TO DELAY UPDATES BY USING A SERVICE CALLED WINDOWS UPDATE FOR BUSINESS.

A NEW VULNERABILITY CALLED “VENOM” HAS BEEN FOUND IN VIRTUALIZATION PROGRAMS AND COULD ALLOW ATTACKERS TO GAIN CODE EXECUTION ON THE HOST AS WELL AS OTHER VM’S OPERATING ON A GIVEN MACHINE. ONCE ATTACKERS BUY SPACE ON A CLOUD HOSTING PROVIDER, THEY CAN USE THE VULNERABILITY TO MOVE ABOUT THE OTHER VM’S ON THE HOST. IF ACCESS TO THE LOCAL NETWORK IS GAINED, THE ATTACKER CAN MAKE AWAY WITH SENSITIE DATA. ACCORDING TO JASON GEFFNER, A RESEARCHER AT CROWDSTRIKE WHO DISCOVERED THE VULNERABILITY, VENOM LIES IN THE VIRTUAL FLOPPY DISK CONTROLLER COMPONENT OF THE OPEN SOURCE VIRTUALIZATION PACKAGE, QEMU.

THIS WEEK ON THE PARTNER SPOTLIGHT WE FOCUS ON PHIL GEESON. PHIL’S COMPANY, WHICH IS CALLED GEESON, IS BASED IN LONDON AND WAS RECENTLY HIGLIGHTED IN A CASE STUDY. IN IT, GEESON TALKS ABOUT THE IMPORTANCE OF THE NOC AND HOW HE’S BEEN ABLE TO ESCALATE SOME OF HIS MORE COMPLEX ISSUES TO A TEAM OF TECHNICIANS THAT HAS SEEN JUST ABOUT EVERYTHING. TO HEAR MORE OF PHIL’S STORY, SIMPLY CLICK ON THE LINK BELOW. 

THAT’S ALL THE TIME WE HAVE FOR THIS SPECIAL MUMBAI, INDIA EDITION OF IT REWIND. I’LL BE BACK IN THE BOSTON STUDIOS NEXT WEEK WITH MORE NEWS FROM THE WORLD OF IT. UNTIL THEN, FIND US ON TWITTER, INSTAGRAM AND VINE AT FOLLOWCONTINUUM. YOU CAN ALSO CONNECT WITH US ON FACEBOOK, LINKEDIN, GOOGLE PLUS AND YOUTUBE. I’LL LEAVE YOU WITH SOME FOOTAGE FROM AN INDIAN DRUMMING CEREMONY THAT TOOK PLACE IN THE NOC EARLIER THIS WEEK. TAKE IT EASY.

 
Don't let a common security or compliance issue sink your ship...
 
   Top Security and Compliance Issues and How to Approach Them Navigate 2014 Session     

Ben is a member of Continuum's marketing team. He specializes in blog content as well as video production. Ben is a graduate of Emerson College and a huge Boston sports fan.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus