![]() ![]() Download your free copy of The MSP’s Guide to Modern Cloud Infrastructure here. Learn more about how flexible security tools and support services from alternative cloud providers help guarantee the security of MSP’s customers resulting in better client retention while fulfilling compliance rules that apply to MSPs and their clients. It could be argued that BDR is a necessity in modern cybersecurity. It’s easy to see why most MSPs are now looking for Backup and Disaster Recovery (BDR) solutions. ![]() In fact, during the “great working from home rush” of March 2020, many MSPs found themselves inundated with clients asking them to “move us to the cloud.” Other alternative cloud use cases might include quickly moving infrastructure onto new virtualized environments. But, if you could roll back data to an early ransomware-free point in time, it could mean the difference between your client staying in business or going out of business. For example, if one of your clients were hit with a ransomware attack, it could easily be the end of a small business. This is why I’m seeing an increasing number of MSPs define cybersecurity not just as preventative technology but as backup and disaster recovery technology as well. One interesting aspect of this focus on cybersecurity is that while your MSP business will undoubtedly do its best to keep your clients safe, you cannot eliminate the risk but only mitigate it. Whether your customers are big or small, non-profit or local, cybercriminals are indiscriminately targeting anybody they can get money from. When it comes to businesses that the bad guys target, nothing is off the table. During the global pandemic, more of the world moved to cloud-based computing, which inevitably gave a wider attack vector for cybercriminals. It’s easy to see why they are doing this. I speak to many managed service providers that are refocusing their business on a security-firstĪpproach. In our third and final post, Richard Tubb shares his perspective on the ebook’s chapter, “Security and the Alternative Cloud.”Ī former managed service provider (MSP) business owner who now helps other MSP businesses make more money, Richard also is the author of the book “The IT Business Owner’s Survival Guide.” He provides the ebook’s foreword as well as commentary at the end of each chapter. Successfully attacking Microsoft 365 achieved both of those objectives handily.īy posting the blog entry about its recent outages on the Friday before a long weekend – and not linking Storm-1359 to an attacker – Microsoft appears to have tried to minimize the publicity around this attack.In this blog post series, we’re previewing chapters in our latest ebook, The MSP’s Guide to Modern Cloud Infrastructure. It has suggested the group "appears to be focused on disruption and publicity." Microsoft hasn't linked "Storm-1359" to Anonymous Sudan, but says the gang "has access to a collection of botnets and tools that could enable the threat actor to launch DDoS attacks from multiple cloud services and open proxy infrastructures. Microsoft admits Azure Resource Manager failed after code change.Microsoft breaks geolocation, locking users out of Azure and M365.Microsoft’s Azure mishap betrays an industry blind to a big problem.Join Jeanne Morain and special guests Christ Armstrong Teknow Consulting and Nitish Shivastta from Harman International as they provide insights and solutions to secure IOT devices on your cloud infrastructure. Microsoft keeps quiet amid talk of possible DDoS attack against Azure Security and compliance standards for IOT are top of mind as viruses such as Marai plague unsuspecting devices.That "tuning" could be the "reviewing our networking systems and recent updates" referred to in the June 6 tweet. Microsoft hardened layer 7 protections including tuning Azure Web Application Firewall (WAF) to better protect customers from the impact of similar DDoS attacks," the post states. "This recent DDoS activity targeted layer 7 rather than layer 3 or 4. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |