MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

VIDEO: Plug-In Puts More Than 200 Million at Risk: IT Rewind Episode 38

Posted June 5, 2015by Ben Barker


A popular plug-in has more than 200 million PC users at risk. Find out how attackers are gaining access to their personal information. Meanwhile, a new exploit is leaving Mac users vulnerable as well! We cover these stories and more on IT Rewind!


IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Researcher Warns Popular Gaming Plug-In Puts Millions of Web Users at Risk from Data Thieves

CIO, @CIOonline, Lucian Constantin, @lconstantin

New Exploit Leaves Most Macs Vulnerable to Permanent Backdooring

Ars Technica, @arstechnica, Dan Goodin, 

With Continuum's Platform, G2 Enjoys Greater Revenue and Profitability

Continuum.net, @FollowContinuum

 

Continuum's Must-Read Blog Post This Week

How Well Do You Know the Decade's Biggest Data Breaches? [Quiz]

How_Well_Do_You_Know_the_Decades_Biggest_Data_Breaches-1.jpg

It's been quite the 10 years for data breaches, hasn't it? Maybe you've been repressing those awful memories from cybercriminal attacks past. Then again, you might be able to recall the results of 2014's Target and 2008's Heartland data breaches, down to the last stolen record and compromised credential. I want to see how much you know about the decade's worst data security fails. Do you think you can hack it? Play to win in this quiz about data loss!

Then, share this post with your colleagues and on your own websites to show the world of managed IT services just how important data protection is for business longevity...oh and that you're really smart for getting all 10 questions correct, of course! Read More»


What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Internet subsidy:

         FCC Proposes Internet Subsidy for Low-Income Users
         The Wall Street Journal, @WSJ, Gautham Nagesh, @gnagesh

Cloud market:

        Gartner: AWS Pulls Further Ahead of Others in IaaS Cloud Market
        The Whir, @theWHIR, Jason Verge

Silent servers:

         30% of Servers Are Sitting "Comatose"
         Anthesis Group, @anthesis_group

 

Transcription

IT REWIND IS ON THE ROAD ONCE AGAIN. THIS WEEK, I’M AT THE R1SOFT OFFICE HERE IN HOUSTON, TEXAS TO BRING YOU THE LATEST FROM THE WORLD OF IT. LETS DO THIS THING!

A FLAW IN THE UNITY WEB PLAYER, WHICH IS INSTALLED ON OVER 200 MILLION PC’S, CONTAINS A FLAW THAT LETS ATTACKERS STEAL USER DATA. THE VULNERABLE DATA COMES FROM WEBSITES THAT THE USER HAS LOGGED INTO SUCH AS EMAIL AND SOCIAL MEDIA ACCOUNTS. DEVELOPERS USE UNITY TECHNOLOGY TO CREATE ONLINE GAMES AND 3D CONTENT. ACCORDING TO RESEARCHERS, THERE IS NO PATCH IN PLACE FOR THE VULNERABILITY AT THIS TIME.

MAC USERS BEWARE. ACCORDING TO A RECENT REPORT, MAC SYSTEMS FROM A YEAR AGO AND OLDER ARE VULNERABLE TO EXPLOITS THAT OVERWRITE THE FIRMWARE THAT ALLOW THE MACHINE TO BOOT UP. ONCE EXPLOITED, THE ATTACKER CAN CONTROL THE COMPROMISED DEVICE. THIS ATTACK IS BEING CALLED MORE SERIOUS THAN THE THUNDERSTRIKE PROOF-OF-CONCEPT EXPLOIT OF LAST YEAR. LAST YEAR’S EXPLOIT REQUIRED PHYSICAL ACCESS WHILE THIS MORE RECENT ATTACK DOES NOT.

THIS WEEK ON THE PARTNER SPOTLIGHT WE FOCUS ON JASON GAY OF G2 TECHNOLOGY GROUP. G2 TECHNOLOGY GROUP IS LOCATED IN THE GREATER BOSTON AREA AND PROVIDES A VARIETY OF IT SERVICES TO ITS CLIENTS. RECENTLY, GAY WAS FEATURED IN A CASE STUDY WHERE HE DESCRIBED HIS COMPANY’S RELATIONSHIP WITH CONTINUUM. ACCORDING TO GAY, PARTNERING WITH CONTINUUM HAS LED TO HIGHER REVENUE NUMBERS, GREATER PROFITABILITY AND THE ABILITY TO INVEST MONEY BACK INTO THE BUSINESS. TO SEE THE FULL CASE STUDY ON JASON GAY AND G2 TECHNOLOGY GROUP, SIMPLY CHECK OUT THE LINK BELOW.

THAT’S ALL THE TIME WE HAVE FOR THIS SPECIAL HOUSTON, TEXAS EDITION OF IT REWIND. I’LL BE BACK IN THE BOSTON STUDIOS NEXT WEEK WITH MORE NEWS FROM THE WORLD OF IT. UNTIL THEN, FIND US ON TWITTER, INSTAGRAM AND VINE AT FOLLOWCONTINUUM. YOU CAN ALSO CONNECT WITH US ON FACEBOOK, LINKEDIN, GOOGLE PLUS AND YOUTUBE. TAKE IT EASY.

 
Don't miss out on Navigate 2015 in Las Vegas!
 
register-for-navigate-2015

Ben is a member of Continuum's marketing team. He specializes in blog content as well as video production. Ben is a graduate of Emerson College and a huge Boston sports fan.

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus