Blog Posts - ID Agent

Protecting Employee Personal Data Fundamental to Corporate Security

October 17th, 2017

by Matt Solomon   If the keys to your house were sitting visibly outside for someone to take, would you just leave them in hopes that no one breaks in? Not likely. Similarly, the keys to the front door of most organizations are sitting on the Dark Web at the ready for use and exploit

View Full Post

Equifax’s Giant Security Breach – Inside Job?

September 8th, 2017

By Kevin Lancaster, CEO Equifax’s giant cybersecurity breach announced yesterday – one of the worst ever – compromised the personal information of almost half the U.S. – potentially 143 million Americans. Residents in the U.K. and Canada were also affected. Based on Equifax’s investigation, the unauthorized access occurred from mid-May through July 2017. This breach

View Full Post

NotPetya – a Threat to Supply Chains

August 3rd, 2017

Ukraine is a nation under digital siege. Over the past few months, it has suffered through four widespread infrastructure attacks, with the Russian government being suspected as the driving force behind the attacks — although to date, there’s no clear evidence of this. The most recent attack, “NotPetya,” occurred on June 27 th, and was initially

View Full Post

ID Agent Recognized in the 2017 Emerging Vendors List by CRN

July 24th, 2017

ID Agent has been named on the 2017 Emerging Vendors list cultivated by CRN. Because this online magazine is dedicated to all things focused on the IT channel, suppliers and technology integrators, it is an honor to make this list. It identifies a group of businesses that provide the best IT and support elements for

View Full Post

The Important Lesson Learned from the U.K. Parliament Cyberattack

July 20th, 2017

The Parliament’s computer network was recently targeted by a brute force attack. Weak password requirements allowed hackers to gain access to 90 of parliaments 650 member’s email accounts. Although IT staff or 3rd party cyber firms can implement strong cyber-security regulations, the members of the House of Commons, or employees at any company are typically the

View Full Post

What an MSP can do to Protect Their Clients from the Dark Web

July 6th, 2017

Not familiar with the term “Dark Web”? That’s okay, even some of the most sophisticated individuals in the tech space have no idea what the dark web is and how it’s accessed. As an MSP or MSSP, you are doing your part to secure and monitor your client’s network and provide a seamless user experience.

View Full Post

MSPs Beware – Dropbox, Google Drive and other Cloud Storage Threats

June 26th, 2017

A Managed Service Provider (MSP) has a lot to worry about within the information technology services they offer. Your clients probably store data that is critical to their continued success on your servers. If their network becomes breached, your network may become susceptible to risk and vice versa. Using cloud storage providers such as Dropbox,

View Full Post

The Biggest Threat to your Network Security: Email Communications

June 19th, 2017

When it comes to protecting your businesses infrastructure, it is safe to assume that you have some form of cyber protection activated. But email communications represent the biggest threat of all, because it takes advantage of the end user, in one form or the other. It generally only requires one misstep from a member of

View Full Post

63% of Data Breaches Result From Weak or Stolen Passwords

June 16th, 2017

In its recent 2016 Data Breach Investigations Report, Verizon Enterprise confirmed many industry trends that we see at ID Agent every day. The most glaring blind spot for organizations is how stolen credentials are the primary means by which hackers exploit their vital systems. Credentials are the holy grail for hackers. In a study of

View Full Post

OneLogin – When Password Storing Goes Wrong

June 15th, 2017

OneLogin, a company that provides single sign-on capabilities to safely store passwords of over 23 million users including 2,000 businesses, has suffered a compromise that included the ability to decrypt customer data. In a recent blog, the company revealed that an attack occurred May 31st at 2 am and was identified by a staff member

View Full Post