Think Tank

From The Comodo Think Tank: How a Layered Approach to IT Security Can Help Protect Against APTs

In a new byline in Security-Today, Comodo Director of Service Provider Technologies Michél Bechard writes about a layered approach to security and the infrastructure, and how it can help protect against advanced persistent threats. From the article: APTs do not look for a ho...

MSP IT Services

From The Comodo Think Tank: What do MSPs need to tell business owners to help them make the right IT SERVICES choices

In a new thought leadership article in Business Solutions Magazine, Comodo Product Manager Ilker Simsir outlines how the services industry has morphed from the reactive break-fix model to the proactive managed services provider approach. Why is full managed services a better...

Comodo RMM

From The Comodo Think Tank: What Are Three Critical Components in a Successful RMM System?

The ability to mind customer systems from afar is vital for Managed Service Providers. Robust remote management and monitoring (RMM) software can allow you to fix problems before they turn into an IT crisis by troubleshooting servers, mobile devices and other endpoints onlin...

Comodo-MSP

4 Strategies for Making the Break from Break/Fix to MSP

Are you thinking about leaving your “break-fix” business model behind? The latest cloud-based management tools such as offered for free on the Comodo One platform, offers IT services companies the opportunity to transition into a managed services provider that can earn stead...

MSP Business

Are Break/Fix Services Breaking Your MSP Business?

With more than a decade passing since IT service companies first started offering MSP services; it comes as a bit of a shock to find that many providers still derive most of their revenue from the traditional break/fix business model. In fact, even companies referring to the...

MSP

Learn how MSPs Convert their Clients from Break/Fix to Managed Services

The IT services industry continues to shift from the old, reactive break-fix model to the proactive Managed Services (MSP) approach, and for good reason: while small to medium-sized businesses might feel secure with their current break-fix “solution,” they may lack the imagi...

bitdefender-hacked

BitDefender Hacked

BitDefender, the well-known IT security firm, fell victim to a data breach in which hackers stole critical customer data. A hacker is demanding $15,000, or, if payment isn’t granted, will release the stolen customer information online. BitDefender failed to encrypt its custo...

Malvertising

Beware Ad Attacks: Malvertising is Booming

Remember when online security meant avoiding those sites on the wrong side of the tracks? No more. Malvertising is booming—not only in the number of attacks, but in sophistication as well. “Malicious advertising” is the illegal effort of spreading malware through legitimate...

mitm

FREAK Attack Warning: Apple and Google Devices Most Vulnerable

An SSL/TLS vulnerability has been identified that attackers could use to downgrade the cryptography of HTTPS connections to one vulnerable to decryption. allowing attackers to listen in on communications between a browsers and a server. The severity of this vulnerability is...

nsa

NSA Report: Defensive Best Practices for Destructive Malware

The National Security Agency (NSA)’s Information Assurance Directorate has released a report on “Defensive Best Practices for Destructive Malware”. The document describes specific actions that organizations can take to defend their networks from malware attacks and pre...

Page 1 of 1612345...10...Last »