SMB Nation Blog

SMB Nation has been serving the Bainbridge Island area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Harrybbb featured in New Book

It’s become fashionable for authors to crowdsource their books and I’m proud to have contributed to the newly released “Tips to Protect Your Business from Cybercrime” effort by Anita Campbell, the CEO of Small Business Trends.

First – you can download the eBook complimentary from this site andyou’ll find my dark-side contribution on page 31 where I speak about the lurking dangers of social engineering, which is both a security and technical topic. Catch my references to the central figure, Frank Abagnale, Jr. best known for his life story in the movie “Catch Me If You Can!” I saw Frank speak in the early 1990s in Seattle before he became famous and he’s not without controversy. Here is a former con artist profiting off his prior misdeeds. But it is a very important topic nonetheless.

Second – I consider this book a -Start Over- topic at SMB Nation. As we continue our 2016 editorial themes of either start-up or starting over, I see this book as your -cookbook- to reinvent yourself as a technology security sleuth. Its ben said a good consultant doesn’t know everything about an area, she just knows where to get the information. This book fills that void many of us have in security as we pivot to profitability as partners.

hb security tip book

Third – crowdsourced books such as this are a double-edged sword. On the one hand, it is a cheap trick for authors to outsource the heavy lifting and for contributors to get a low friction love tap. I have even seen such books where they print a unique cover for each contributor implying that each contributor wrote the entire book. This is really peeved Vlad Masek at Own Web Now in his Vladville blog where he really goes after self-published MSPs. However, crowdsourced books have an upside. In the case of Campbell’s effort herein, it provides diversity and richer content. More importantly, she has engaged many people I’ve never heard of so I feel like she has broken way beyond the “same old, same old” SMB partner crowd.

Download here.

Continue reading
648 Hits

Kaspersky Releases New Version of Kaspersky Small Office Security

Kaspersky Lab, an endpoint protection solution provider, announced today the latest edition of Kaspersky Small Office Security, a security solution built for SMBs with fewer than 25 employees that protects Windows- and Mac-based devices.KSOS 4 main screen PC

SMBs, frequently targeted by cybercriminals because of perceived easier access to data, require increased security in an increasingly dangerous digital environment.

“Running a small business can be very exciting and fun, but being small doesn’t mean being less noticeable by cybercriminals. It’s very important for businesses to pay more attention to ensuring their cybersecurity, and Kaspersky Small Office Security has made it easy. It’s straightforward to install, simple to configure, and easy to maintain, so that business owners can get on with doing what they do best: making the company a success,” Konstantin Voronkov, Head of Endpoint Product Management, Kaspersky Lab.

Key features of the new edition include enhanced threat protection, cloud-based management console and password management, and improvements to security for financial data.

P.S. Be sure to attend our online Office 365 connected conference, June 2-3. No travel, no hotel, no traffic! Sign up at getconnected.o365nation.com

Continue reading
1073 Hits
0 Comments

Webroot at RSA Conference 2015: Collective Threat Intelligence Can Protect the Internet of Everything

Webroot, a provider of intelligent security for endpoints and collective threat intelligence, announced it will showcase a self-learning platform designed to protect the Internet of Everything at the RSA Conference 2015, April 20 to 24 in San Francisco, Calif.

Webroot Logo

According to Webroot, its platform is the most accurate threat intelligence network developed to protect IoE, and it can identify unique threats by examining actions, locations and association with malicious matter.

Hal Lonas, Webroot CTO, and David Dufour, Webroot senior director of security architecture, will host a speaking session April 22 and 24, respectively. Webroot security professionals will also provide live intelligent cybersecurity presentations and technology demonstrations in booth 4114 in Moscone North.

During the conference, Webroot research, RSA conference coverage and cybersecurity tactics will be available in Webroot social media activity and through following #GetSmarter.

Continue reading
2404 Hits
0 Comments

Comodo Announces Availability of MyDLP v2.8

Cybersecurity solution developer Comodo announced today the next generation of Comodo MyDLP, a software solution with a single user license that monitors, discovers and prevents company data leakage from endpoints networkwide. Comodo Logo

"The endpoint is the most volatile security risk for data loss in networks today, as IT administrators struggle to balance security needs without hindering employee needs and performance," said Burak Akin, product manager for MyDLP, Comodo.   "MyDLP helps ensure regulatory compliance and limiting access to those who can move information, helping enterprises manage and control data leakage from both controlled and uncontrolled endpoints."  

MyDLP can be upgraded through on-premise or SaaS offerings at no additional cost. Those interested can view a demonstration of MyDLP at RSA 2015 in booth 815 at the Comodo pavilion in South Hall.

Continue reading
1325 Hits
0 Comments

Intel Survey Examines Security Strategies and Incidents

Intel logoIntel Security commissioned the report “Tackling Attack Detection and Incident Response” from Enterprise Strategy Group, examining companies’ security strategies, cyber-attack environment, incident response challenges and needs.

Almost 30 percent of security incidents are targeted attacks, and a slow or inadequate response results in loss of sensitive data.

“Just as the medical profession must deliver heart-attack patients to the hospital within a ‘golden hour’ to maximize likelihood of survival, the security industry must work towards reducing the time it takes organizations to detect and deflect attacks, before damage is inflicted,” said Chris Young, General Manager at Intel Security. “This requires that we ask and answer tough questions on what is failing us, and evolve our thinking around how we do security.”

The survey found respondents are calling for better integration between security tools, improved analytics, help to contextualize data captured, increased expertise and automation to enhance action.

The survey, available here, included 700 IT security professionals at mid-market and enterprise organizations.

Continue reading
872 Hits
0 Comments

PwC survey highlights eight cyber threats and how to counter them


pwc logo

A new cybersecurity survey from PwC and CSO magazine makes for some chilling reading for U.S. businesses. According to the 2014 U.S. State of Cybercrime Survey the rate of cyber attacks is increasing and the majority of U.S. organizations are falling sort when it comes to addressing them. In fact, 62 percent of organizations do not have the structure in place to prioritize security investments based on impact and risk.

The survey, through which CSO queried more than 500 U.S. executives, security experts and others from both the public and private sectors, was conducted by CSO magazine in collaboration with PwC, the U.S. Secret Service and the CERT Division of the Software Engineering Institute at Carnegie Mellon University.

Other key findings:

  •              Organizations detected an average of 135 security incidents over the past year.
  •              More than three quarters (77 percent) of respondents reported a security event in the past year.
  •              More than two-thirds (67 percent) of respondents who detected a security incident were unable to gauge its financial impact. For those who could, the average annual monetary loss was projected at $415,000 per organization.
  •             59 percent reported they were more concerned about cybersecurity threats this year than last year.
  •             34 percent said they had seen an increase in the number of security incidents in their organizations.
  •             Enterprise mobility is a massive hole. Only 31 percent of respondents have a mobile secuity strategy, while only 38& bother to encrypt devices. Only 36 percent employ an MDM solution.
  •              Less have half of respondents have an effective risk management program. Only 47 percent perform periodic risk assessments and only 24 percent have an objective third party assess their security program.
  • "Cyber criminals evolve their tactics very rapidly, and the repercussions of cybercrime are overwhelming for any single organization to combat alone. It's imperative that private and public organizations collaborate to combat cybercrime and gain intelligence about security threats and how to respond to them. A united response will prove to be an indispensable tool in advancing the state of cybersecurity," said David Burg, PwC's global and U.S. advisory cybersecurity leader, in a prepared statement.

PwC also offered the following eight recommendations for combating cybercrime:

  •                    Assess risks associated with supply chain partners
  •                    Develop threat-specific policies
  •                    Enhance training and create workforce messaging to boost cybersecurity awareness across the organization
  •                    Ensure that mobile security practices keep pace with adoption and use of mobile devices
  •                    Hold third parties to the same or higher cybersecurity standards
  •                    Invest in people, processes and technologies
  •                    Perform cyber risk assessments regularly
  •                   Take advantage of information sharing internally and externally to learn about new cyber risks

“Despite substantial investments in cybersecurity technologies, cyber criminals continue to find ways to circumvent these technologies in order to obtain sensitive information that they can monetize,” said Ed Lowery, Special Agent in Charge, Criminal Investigative Division, U.S. Secret Service in a statement. “The increasing sophistication of cyber criminals and their ability to circumvent security technologies indicates the need for a radically different approach to cybersecurity: A balanced approach that, in addition to using effective cybersecurity technologies, develops the people, processes, and effective partnerships in order to strategically counter cybersecurity threats.”

The full survey is available for download here.

Continue reading
2838 Hits
0 Comments

Tech Industry Convenes this week for CompTIA ChannelCon

340392879On its third and final day of its annual industry event, CompTIA’s ChannelCon (formerly Breakaway) featured meetings of several CompTIA member communities and advisory councils. These groups of industry thought leaders help shape the association’s initiatives, programs, education and research.

Continue reading
1924 Hits
0 Comments

Oops…My Bad! 5 Blogs We Missed Last Week

Here we go again! As I do each week, I am really enjoying bringing our readers a quick round-up of the blog coverage I didn’t manage to get to during the week prior.

In addition, here at SMB Nation, we are already gearing up for our annual fall event to be held Oct. 10-12 in Las Vegas at the Rio! We have been hard at work designing a brand new Web site specifically for this event, which you must check out today: http://fall.smbnation.com/. For additional information on the new Web site and our fall conference, check out our blog post here.

Speaking of live events, Harrybbb will be virtually attending this week’s Microsoft WPC event held in Houston this week. Harry will be viewing the event and reporting live from his home office on Bainbridge Island…it’s the “new new” business model known as hybrid conferencing! Join Harry virtually at WPC by logging on to: http://www.digitalwpc.com.

Continue reading
2533 Hits
0 Comments