MSP Blog Logo

BDR

Business Growth

Cybersecurity

Help Desk

MDM

RMM

Sales & Marketing

Subscribe

Empowering Your MSP Business to Grow and Prosper—One Post at a Time

5 Ways to Improve Your MSP Service Level Agreement (SLA)

Featured Post

5 Ways to Improve Your MSP Service Level Agreements (SLAs)

SLAs are the foundation of your MSP business. They are essential to building strong client relationships and must be clear, reasonable and well-constructed.

Read Now

VIDEO: Wireless Devices Put Users at Risk: IT Rewind Episode 67

Posted February 26, 2016by Ben Barker

 

Wireless mice and keyboards could allow attackers to take over user devices. Meanwhile, lawmakers are pushing for the creation of an encryption commission. To hear more, just click play!

 

IT Rewind Featured Stories:

Did our short segment leave you wanting more? Check out the original articles of stories we covered!

Lawmakers Push for Encryption Commission to Find Compromise

InfoWorld, @infoworld, Grant Gross, @GrantGross

Laptops, PCs Open to Cyber-Attack Through Wireless Mice, Keyboards

eWeek, @eWEEKNews, Robert Lemos


Continuum's Must-Read Blog Post This Week

New Locky Ransomware - FAQs and How MSPs Can Act Now


New-Locky-Ransomware---FAQs-and-How-MSPs-Can-Act-Now.png

Have you opened any invoice attachments lately? Now, there's a new ransomware called Locky that's joined the ranks of viruses like CryptoLocker and CryptoWall. This latest malware threat was detected just last week and already, IT service providers and MSPs have discovered that it's spread at an alarming rate, employing sophisticated social engineering tactics and bypassing antivirus (AV), spam filtering and web filtering solutions. According to Dark Reading, Kevin Beaumont, one of the first security researchers to unearth Locky, revealed he had seen "around 4,000 new infections per hour, or roughly 100,000 per day."

How does Locky work? What does it reveal about the state of ransomware and next generation cyber threats? What do you need to know to protect clients? Answers to all this and more!

Keep reading »

 

What Else Is New in the IT Channel?

Now that you've seen our top picks for this week, here are some more stories that made the headlines. Have a suggestion for a story that we should cover next week? Let us know by commenting below or tweeting @FollowContinuum or @BenDBarker!

Rapidly rising ransomware:

         Ransomware Rising
         Network World, @NetworkWorld, Jason Armerding

Apple's impenitrable iPhone:

       Apple Wants to Make It Impossible for the Company to Comply With Law Enforcement's Demands for Data
       Business Insider, @businessinsider, Rob Price, @robaeprice

Speed up Windows 10:

         3 Ways to Speed up Windows 10 Without Buying New Hardware
         PCWorld, @pcworld, Lincoln Spector, @LincolnSpector


Transcription

Hey everyone welcome back for another edition of IT Rewind. Today is our 67th episode and it’s an extra special episode for a couple of reasons. First of all, 67 is the same number as former Miami Dolphin offensive lineman and member of the 17-0 Super Bowl team, Bob Kuechenberg. But more importantly, this marks the very first IT Rewind episode in our new Boston studio! Looks the same? Surprised? Let’s do this thing!

Lawmakers are pushing for the creation of an encryption commission that would be responsible for recommending resolutions to debates over government access to encrypted communications. Currently, Apple and the FBI are in court fighting over access to a terrorist suspect’s iPhone. The proposed commission would include law enforcement leaders, the tech industry, and private groups. According to Representative Michael McCaul from Texas, passing “knee-jerk” legislation won’t solve the over arching problem. McCaul said quote – given the complexities of this issue, there’s no legislative, knee-jerk response that will solve this problem. This is an urgent issue, and I believe a commission is the best vehicle – end quote. The development of a commission would give all sides a chance to look at the issue and seek alternative resolutions. 

Do you use a wireless mouse or keyboard? I have mine right here. I love this thing. However, according to Bastille, a communications-security firm, these wireless devices are allowing attackers to send commands to user systems. This type of attack is being called “MouseJacking” and it exploits the weak security of the custom communications protocols that many wireless mice and keyboards use. Among the notable vendors that could be affected are Logitech, Microsoft and Dell. Basically, attacks can send mouse click and key strikes to targeted systems from more than 100 meters away. Chris Rouland, founder and CTO of Bastille said quote – “It really only takes a $15 dongle and about 15 lines of Python code and you can get complete control of the target system.” -End quote. It’s worth noting that the attack only affects peripherals that do not sue the Bluetooth standard to communicate between devices.

That’s all the time that we have for this week’s episode of IT Rewind, but before we go, I want to mention this week’s Ribbon Cutting Ceremony. On Thursday, Continuum invited guests to the new office space at 99 High Street in Boston to celebrate and give tours. Jay Ash, Secretary of Housing and Economic Development for the Commonwealth of Massachusetts even showed up and helped Continuum’s CEO, Michael George cut the ribbon.

As always, you can always find us on Twitter, Instagram and Vine at FollowContinuum. We’re also on Facebook, LinkedIn, Spiceworks, YouTube and Periscope.

Take it easy.

 

How do you know if you're choosing the right vendor for your MSP business?

 2016 Business Planning - How to Effectively Choose Your Vendors

Ben is a member of Continuum's marketing team. He specializes in blog content as well as video production. Ben is a graduate of Emerson College and a huge Boston sports fan.

Topics: Industry News

RMM 101: Must-haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus