{"id":17898,"date":"2020-03-17T20:30:39","date_gmt":"2020-03-18T04:30:39","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11631\/"},"modified":"2020-03-17T20:30:39","modified_gmt":"2020-03-18T04:30:39","slug":"news-11631","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/03\/17\/news-11631\/","title":{"rendered":"Lock and Code S1Ep2: On the challenges of managed service providers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/lockandcode.podbean.com\/mf\/play\/77xfrb\/Lock_and_Code_2_The_Challenges_and_Successes_of_the_MSP_Industry_REVISION_1.mp3\"\/><\/p>\n<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 16 Mar 2020 15:28:35 +0000<\/strong><\/p>\n<p>This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to two representatives from an Atlanta-based managed service provider\u2014a manager of engineering services and a data center architect\u2014about the daily challenges of managing thousands of nodes and the future of the industry. <\/p>\n<p>Tune in for all this and more on the latest episode of Lock and Code, with host David Ruiz.<\/p>\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/lockandcode.podbean.com\/mf\/play\/77xfrb\/Lock_and_Code_2_The_Challenges_and_Successes_of_the_MSP_Industry_REVISION_1.mp3\"><\/audio><\/figure>\n<p>You can also find us on the\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/lock-and-code\/id1500049667\">Apple iTunes store<\/a>, on\u00a0<a href=\"https:\/\/play.google.com\/music\/listen#\/ps\/Iv5rmv4i6cjdk4r7ft23xzf72au\">Google Play Music<\/a>, plus whatever preferred podcast platform you use.  <\/p>\n<h3>We cover our own research on:<\/h3>\n<ul>\n<li><a rel=\"noreferrer noopener\" aria-label=\"International Women\u2019s Day (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/stalkerware\/2020\/03\/international-womens-day-awareness-of-stalkerware-monitoring-and-spyware-apps-on-the-rise\/\" target=\"_blank\">International Women\u2019s Day<\/a>: Is awareness of stalkerware, monitoring, and spyware apps on the rise?<\/li>\n<li>How a <a rel=\"noreferrer noopener\" aria-label=\"Rocket Loader (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2020\/03\/rocket-loader-skimmer-impersonates-cloudflare-library-in-clever-scheme\/\" target=\"_blank\">Rocket Loader<\/a> skimmer impersonates the CloudFlare library in a clever scheme<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Securing the MSP (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2020\/03\/securing-the-msp-best-practices-for-vetting-cybersecurity-vendors\/\" target=\"_blank\">Securing the MSP<\/a>: What are the best practices for vetting cybersecurity vendors?<\/li>\n<li>Remote security, aka <a rel=\"noreferrer noopener\" aria-label=\"RemoteSec (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/business-2\/2020\/03\/remotesec-achieving-on-prem-security-levels-with-cloud-based-remote-teams\/\" target=\"_blank\">RemoteSec<\/a>, and how to achieve on-prem security levels with cloud-based remote teams<\/li>\n<li>How the <a rel=\"noreferrer noopener\" aria-label=\"Coronavirus (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2020\/03\/coronavirus-impacts-security-conferences-and-events-check-your-schedule\/\" target=\"_blank\">coronavirus<\/a> has impacted security conferences and events, including which were cancelled, postponed, or switched over to virtual<\/li>\n<li>The effects of <a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2020\/03\/the-effects-of-climate-change-on-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"climate change on cybersecurity (opens in a new tab)\">climate change on cybersecurity<\/a> <\/li>\n<\/ul>\n<h3> Plus, other cybersecurity news: <\/h3>\n<ul>\n<li>FBI warning: Hackers are targeting Office 365, G Suite users with <a rel=\"noreferrer noopener\" aria-label=\"business email compromise (opens in a new tab)\" href=\"https:\/\/siliconangle.com\/2020\/03\/08\/fbi-warns-hackers-targeting-office-365-g-suite-users-business-email-compromise-attacks\/\" target=\"_blank\">business email compromise<\/a> attacks. (Source: SiliconAngle)<\/li>\n<li>How poor IoT security is allowing the 12-year-old <a rel=\"noreferrer noopener\" aria-label=\"Conficker (opens in a new tab)\" href=\"https:\/\/www.zdnet.com\/article\/how-poor-iot-security-is-allowing-this-ten-year-old-malware-to-make-a-comeback\/\" target=\"_blank\">Conficker<\/a> malware to make a comeback. (Source: ZDNet)<\/li>\n<li>Recently discovered <a rel=\"noreferrer noopener\" aria-label=\"spear-phishing (opens in a new tab)\" href=\"https:\/\/threatpost.com\/spear-phishing-attack-lures-victims-with-hiv-results\/153536\/\" target=\"_blank\">spear phishing<\/a> emails are using HIV test results  as a scare factor. (Source: ThreatPost)<\/li>\n<li><a rel=\"noreferrer noopener\" aria-label=\"Talkspace (opens in a new tab)\" href=\"https:\/\/techcrunch.com\/2020\/03\/09\/talkspace-cease-desist\/\" target=\"_blank\">Talkspace<\/a> threatened to sue a security researcher over a bug report, and forced him to take down a blog post. (Source: TechCrunch)<\/li>\n<li>Independent testing found Google&#8217;s <a rel=\"noreferrer noopener\" aria-label=\"Play Protect (opens in a new tab)\" href=\"http:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2020\/03\/10\/android-users-beware-this-is-why-you-should-never-rely-on-googles-own-malware-protection\/\" target=\"_blank\">Play Protect<\/a> to be poor on malware protection. (Source: Forbes)<\/li>\n<li>Researchers found thousands of <a rel=\"noreferrer noopener\" aria-label=\"fingerprint files (opens in a new tab)\" href=\"https:\/\/www.cnet.com\/news\/thousands-of-fingerprint-files-exposed-in-unsecured-database-research-finds\/\" target=\"_blank\">fingerprint files<\/a> exposed in an unsecured database. (Source: Cnet)<\/li>\n<li>Researchers discovered a <a rel=\"noreferrer noopener\" aria-label=\"phishing page (opens in a new tab)\" href=\"https:\/\/blog.sucuri.net\/2020\/03\/3ds-otp-phishing.html\" target=\"_blank\">phishing page<\/a> informing victims about fake Netflix service disruptions, supposedly due to problems with the victim\u2019s payment method. (Source: Sucuri Blog)<\/li>\n<\/ul>\n<p> Stay safe, everyone! <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep2-on-the-challenges-of-managed-service-providers\/\">Lock and Code S1Ep2: On the challenges of managed service providers<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep2-on-the-challenges-of-managed-service-providers\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Malwarebytes Labs| Date: Mon, 16 Mar 2020 15:28:35 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep2-on-the-challenges-of-managed-service-providers\/' title='Lock and Code S1Ep2: On the challenges of managed service providers'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/02\/blog-image_podcast.png' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>On episode 2 of Lock and Code, we discuss the latest security news, including how to secure remote workers, security conferences cancelled because of coronavirus, and Google Play&#8217;s poor performance on stopping malware. Plus, we speak to two MSP representatives on the daily challenges of managing thousands of endpoints.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/podcast\/\" rel=\"category tag\">Podcast<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bec\/\" rel=\"tag\">bec<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/conficker\/\" rel=\"tag\">conficker<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/coronavirus\/\" rel=\"tag\">coronavirus<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/fingerprint-files\/\" rel=\"tag\">fingerprint files<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/msp\/\" rel=\"tag\">MSP<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/phishing-scam\/\" rel=\"tag\">phishing scam<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/play-protect\/\" rel=\"tag\">play protect<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/remote\/\" rel=\"tag\">remote<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/skimmer\/\" rel=\"tag\">skimmer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/smbv3\/\" rel=\"tag\">smbv3<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/spear-phishing\/\" rel=\"tag\">spear phishing<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep2-on-the-challenges-of-managed-service-providers\/' title='Lock and Code S1Ep2: On the challenges of managed service providers'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/podcast\/2020\/03\/lock-and-code-s1ep2-on-the-challenges-of-managed-service-providers\/\">Lock and Code S1Ep2: On the challenges of managed service providers<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[14347,17412,24152,24454,12756,10502,13133,5820,22846,19623,24455,11727],"class_list":["post-17898","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-bec","tag-conficker","tag-coronavirus","tag-fingerprint-files","tag-msp","tag-phishing-scam","tag-play-protect","tag-podcast","tag-remote","tag-skimmer","tag-smbv3","tag-spear-phishing"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17898"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17898\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17898"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}