Blog Posts - ID Agent

NotPetya – a Threat to Supply Chains

August 3rd, 2017

Ukraine is a nation under digital siege. Over the past few months, it has suffered through four widespread infrastructure attacks, with the Russian government being suspected as the driving force behind the attacks — although to date, there’s no clear evidence of this. The most recent attack, “NotPetya,” occurred on June 27 th, and was initially

View Full Post

ID Agent Recognized in the 2017 Emerging Vendors List by CRN

July 24th, 2017

ID Agent has been named on the 2017 Emerging Vendors list cultivated by CRN. Because this online magazine is dedicated to all things focused on the IT channel, suppliers and technology integrators, it is an honor to make this list. It identifies a group of businesses that provide the best IT and support elements for

View Full Post

The Important Lesson Learned from the U.K. Parliament Cyberattack

July 20th, 2017

The Parliament’s computer network was recently targeted by a brute force attack. Weak password requirements allowed hackers to gain access to 90 of parliaments 650 member’s email accounts. Although IT staff or 3rd party cyber firms can implement strong cyber-security regulations, the members of the House of Commons, or employees at any company are typically the

View Full Post

What an MSP can do to Protect Their Clients from the Dark Web

July 6th, 2017

Not familiar with the term “Dark Web”? That’s okay, even some of the most sophisticated individuals in the tech space have no idea what the dark web is and how it’s accessed. As an MSP or MSSP, you are doing your part to secure and monitor your client’s network and provide a seamless user experience.

View Full Post

MSPs Beware – Dropbox, Google Drive and other Cloud Storage Threats

June 26th, 2017

A Managed Service Provider (MSP) has a lot to worry about within the information technology services they offer. Your clients probably store data that is critical to their continued success on your servers. If their network becomes breached, your network may become susceptible to risk and vice versa. Using cloud storage providers such as Dropbox,

View Full Post

The Biggest Threat to your Network Security: Email Communications

June 19th, 2017

When it comes to protecting your businesses infrastructure, it is safe to assume that you have some form of cyber protection activated. But email communications represent the biggest threat of all, because it takes advantage of the end user, in one form or the other. It generally only requires one misstep from a member of

View Full Post

63% of Data Breaches Result From Weak or Stolen Passwords

June 16th, 2017

In its recent 2016 Data Breach Investigations Report, Verizon Enterprise confirmed many industry trends that we see at ID Agent every day. The most glaring blind spot for organizations is how stolen credentials are the primary means by which hackers exploit their vital systems. Credentials are the holy grail for hackers. In a study of

View Full Post

OneLogin – When Password Storing Goes Wrong

June 15th, 2017

OneLogin, a company that provides single sign-on capabilities to safely store passwords of over 23 million users including 2,000 businesses, has suffered a compromise that included the ability to decrypt customer data. In a recent blog, the company revealed that an attack occurred May 31st at 2 am and was identified by a staff member

View Full Post

The Ransomware Assault on Healthcare

June 12th, 2017

Hospital networks can unfortunately become a goldmine for attackers that use ransomware worms as their weapon. If deployed, lives may be endangered, hospitals usually must pay the ransom, or pay to get files retrieved and its reputation could be damaged. Because these attacks are increasing due to lucrative benefits, teaching and reminding hospital staff to

View Full Post

Why Managed Service Providers Must Monitor for Compromised Credentials

June 8th, 2017

If your customers are like most organizations, 75% of their employees recycle or use a variation of the same password across most of the systems and websites they access – both on and off their employer’s network. And this practice is becoming increasingly dangerous. Your company may have implemented an internal protocol to educate your

View Full Post