Securing IT Infrastructure in today’s corporate environments is extremely critical. There are lurking threats waiting to infest networks and systems with all kinds of major issues leading to massive setbacks for any company. With the possibility of losing millions of dollars and their earned reputation at stake; most companies regardless of size have taken a very serious approach to securing their IT assets. The risk of any exposure to any type of attack clearly outweighs the investments that a company should be making in ensuring that they are secure. Like all other IT implementations, security too is an ongoing process. It cannot start and end...
Most organizations are either familiar with, or have been victimized by, a Business Email Compromise (BEC). A BEC is a type of scam targeting organizations with the goal of leveraging a compromised email account to trick employees and executives into making fraudulent wire transfers. However, it’s not BEC attacks which are predicted to be the largest threat to organizations worldwide over the next 12-18 months, it’s a BEC variant known as Vendor Email Compromise (VEC).  The US Treasury department estimates BEC attacks already cost US firms $300 million a month.
If you talk to any security expert about securing online accounts, the first thing they will tell you is “enable 2FA.” However if you start looking at the number of accounts where Two-Factor Authentication is purposely turned off or opted out of, you will be surprised at how high the number is. The reason for this is because most end users consider 2FA to be a nuisance, and don’t see the need for it when it comes to securing their accounts.
I was meeting with a company the other day, and security was naturally brought up. In their opinion, they felt that they had a good handle on security and their overall network — they perform security awareness training, they have a SIEM solution, they have AD monitoring and firewall monitoring, and a plethora of other items that would keep their business safe. Digging in deeper I started asking about what types of incidents they got notified for, and how do they get notified? That was when I realized that they were trying to do everything correctly, but they didn’t actually have the manpower to do everything they wanted.
Most people in the United States think of Halloween when they think of the month of October. As we begin October 2019 you should also think of Cybersecurity Awareness Month and training yourself to check your emails as closely as the parents do the candy that is brought home on Halloween evening.
Teams is Microsoft’s premiere communication and collaboration tool. It has now replaced Skype, which was strictly a chat and calling platform; however, Teams’ capabilities are far greater than its predecessor. It is a four-in-one shared workplace that streamlines messaging and chat, meetings and file sharing, calling, and app integration.
Businesses often utilize Teams to increase productivity, improve collaboration and enable innovation across their entire organization.
Fourth-Annual List Reveals Leading MSPs In Healthcare, Government, Financial Services, Manufacturing & More
Foxborough, MA, April 29, 2019 — Thrive, a premier provider of Next Generation Managed Services has been named to After Nines Inc.’s ChannelE2E Top 100 Vertical Market MSPs list and research for 2019. The annual list and research identify and honor the top 100 managed services providers (MSPs) in healthcare, government, financial services, manufacturing, legal, not-for-profit and additional vertical markets.
Tech Elite 250 List Recognizes Highest Achieving IT Solution Providers in Vendor Certifications
Thrive proudly announced today that CRN®, a brand of The Channel Company, has named Thrive to its 2019 Tech Elite 250 list. This annual list honors a select group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers, scaled to their company size. These companies have distinguished themselves with multiple, top-level IT certifications, specializations, and partner program designations from the industry’s most prestigious technology providers.
Normally I talk about how to setup your work network to be more secure. Today, I want to talk about your personal security. Not physical security, but virtual security. Most people do not want to tinker with their home network. I don’t blame you, neither do I. I just want my home network to work… mostly because if it breaks, then all the kids will come running wondering why the sky is falling.
But for personal technology, there are some practical steps that will help make you more secure.
Thrive is proud to announce that CRN, a brand of The Channel Company, has named us to its 2019 Managed Service Provider (MSP) 500 list in the Elite 150 category. This annual list recognizes North American solution providers with innovative approaches to managed services. These services help customers improve operational efficiencies, maximize return on IT investments, and continuously help them navigate the complexities of IT solutions.