https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • Analytics
    • Artificial Intelligence
    • Cloud
    • Data Centers
    • Desktop
    • IoT
    • Mobility
    • Networking
    • Open Source
    • RMM/PSA
    • Security
    • Virtualization
    • Voice/Connectivity
  • Strategy
    • Back
    • Best Practices
    • Business Models
    • Channel 101
    • Channel Programs
    • Channel Research
    • Digital Transformation
    • Diversity & Inclusion
    • Leadership
    • Mergers and Acquisitions
    • Sales & Marketing
    • Specialty Practices
  • MSSP Insider
    • Back
    • Business of Security
    • Cloud and Edge
    • Endpoint
    • Network
    • People and Careers
    • Training and Policies
  • MSP 501
    • Back
    • 2020 MSP 501 Rankings
    • 2020 Hot 101 Rankings
    • 2020 MSP 501 Report
  • Intelligence
    • Back
    • Our Sponsors
    • From the Industry
    • Content Resources
    • COVID-19 Partner Help
    • Galleries
    • Podcasts
    • Reports
    • Videos
    • Webinars
    • White Papers
  • EMEA
  • Awards
    • Back
    • Excellence in Digital Services
    • 2020 MSP 501
    • Top Gun 51
  • Events
    • Back
    • CP Conference & Expo
    • Channel Partners Evolution
    • Channel Evolution Europe
    • Channel Partners Event Coverage
    • Webinars
  • Channel Mentor
    • Back
    • Channel Market Intelligence
    • Channel Educational Series
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Digital Service Providers
  • Cloud Service Providers
  • CHANNEL PARTNERS ONLINE
 Channel Futures

From the Industry


Sponsor Content

Mind the gap

Common Threats Need Shared Solutions

  • July 16, 2018
There’s a cybersecurity information gap, and it’s time to close it.

Let’s be sure: No one celebrates cyberattacks, except the thieves who get away with them. But here at Carbonite, we keep a running tally of the number of businesses we’ve bailed out from having to pay ransoms to cyberthieves. And if we’re being honest, rescuing data that’s being held hostage by criminals is a source of pride for us, both personally and professionally. But coming from a business with its own data to protect, it would be better if we didn’t have to do it. And because we’re a business with critical data to protect, we’re especially sympathetic to the businesses that fail to protect themselves adequately. All too often, it’s because they aren’t fully aware of the nature and deceptiveness of the attackers.

Too many businesses–especially small to midsize ones–make the mistake of thinking their firewall and antivirus software are sufficient. No firewall or virus-detection method can catch all viruses. Even the best anti-virus software will fail to detect the latest threats. Many of the businesses we rescue suffer from a common vulnerability: a false sense of security that IT can unilaterally handle the full landscape of cyberthreats. Here’s some information to help your customers know why backup protection is essential for addressing the attacks that manage to bypass their first lines of defense.

3 Tricks Hackers Use to Evade Firewalls and Antivirus 

1. Polymorphic code: A form of self-modifying code that changes each time it runs.

Related: Polymorphic encryption, oligomorphic code

2. Shellcode: Uses the command shell to give an attacker control over a machine.

Related: Staged shellcode, egg-hunt shellcode

3. Social engineering: Tricking employees into clicking on malicious links.

Related: Spear phishing, fake anti-virus

How Vulnerable Are Your Customers?

Consider this number: 11,932

That’s how many businesses we’ve helped recover files after bad actors infiltrated their systems.

And counting …

How to Thwart Cybercriminals 

Did you know:

Malware cannot spread to files that are encrypted and backed up.

Pro Tip:

Be sure to wipe malicious code completely from the system before you restore backup files to prevent the virus from spreading.

How to Tackle the Most Common Threats

The automation of backup addresses one of the biggest vulnerabilities: employees. Of course, you’ll never get all employees to stop clicking on malicious links. Here are five sets of do’s and don’ts for using backup to mitigate cyberattacks.

1. Do: Implement consistent, global backup policies

Don’t: Let employees improvise their own solutions.

2. Do: Use encryption at each step in the backup process.

Don’t: Allow data to exist in an unencrypted state.

3. Do: Look for large spikes in backup sizes, which could be a sign of ransomware.

Don’t: Expect the virus or ransomware to identify itself right away.

4. Do: Enable point-in-time recovery so you can turn back the clock on an infection.

Don’t: Keep files for longer than the document-retention policy requires.

5. Do: Expect that your customers will be targeted by ransomware attack.

Don’t: Wait until it’s too late to deploy enterprise-wide backup.
 

Backup: When All Else Fails

If your customers are using Carbonite to back up their servers and endpoints, there’s a good chance you can recover clean versions of files and data as they existed before there was a breach on the system. This is what works for us, and it will work for you. If customers are under the impression that firewalls and antivirus are sufficient to keep them protected, let them know how easy those measures are for cyberthieves to bypass using the tactics mentioned above. Then maybe share with them how many businesses we’ve had to help when firewalls and antivirus measures failed to work. If more businesses took simple measures to protect data–like deploying a comprehensive backup and disaster recovery solution–it could deplete a highly profitable source of revenue for cybercriminals, who have no business being in business.

This guest blog is part of a Channel Futures sponsorship.

Tags: Cloud Service Providers Digital Service Providers MSPs VARs/SIs Best Practices From the Industry Security Sponsor Content

Related


  • Partner Program Update
    Palo Alto Networks Rolls Out Latest NextWave Partner Program
    NextWave 3.0 will help partners differentiate their services.
  • Computer network connection modern city future technology
    Juniper Networks Integrates Mist, 128 Offerings Following Acquisitions
    Juniper is baking AI into its recently acquired SD-WAN offering.
  • Roaring 20s
    The “Roaring 20s” Are Coming
    2020 was a significant challenge, but the roaring 20s will come—thanks, in no small part, to partners.
  • Accelerate
    OneLogin Hires Juniper Networks Vet to Lead Accelerate Partner Program
    OneLogin last fall expanded its Accelerate partner program to include partner tiering.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Infoblox Cloud Specialization to Help Partners with SaaS Sales
  • New Commvault EMEA Channel Exec Outlines Plans for Channel
  • Kaseya Buying RocketCyber to Improve MSPs' Security Capabilities
  • From Salesperson to Trusted Adviser: 3 Tips for Mastering Consultative IT Sales

Galleries

View all

Channel Partners Virtual 2021 Is the Hottest Ticket in Town

February 26, 2021

Industry Perspectives

View all

The “Roaring 20s” Are Coming

February 25, 2021

Three Ways MSPs Can Improve Supply Chain Security

February 24, 2021

SASE: The Key to Mitigating Business Transformation Risk

February 22, 2021

Webinars

View all

A Partner’s Perspective on Channel Success in 2021

March 17, 2021

XDR and Why it Matters to MSPs

March 24, 2021

Top Security Trends Impacting Technology Security Providers In 2021

March 25, 2021

White Papers

View all

Ready To Add Cutting Edge IoT Solutions To Your Portfolio?

  • 1
February 25, 2021

What Is The Value Of Distribution For The Internet Of Things?

February 25, 2021

The Internet of Things (IoT): Where do You Begin?

  • 1
February 25, 2021

Upcoming Events

View all

Channel Partners Virtual

March 2, 2021 - March 4, 2021

Channel Partners Conference & Expo

November 1, 2021 - November 4, 2021

Videos and Fastchats

View all

FASTCHAT: How SOAR Eliminates Security Challenges and Elevates Service Provider Revenues

January 6, 2021

Happy Holidays from Channel Partners & Channel Futures!

December 21, 2020

FASTCHAT: How Old, Unpatched Technologies Are Creating New Security Threats for MSPs and Their Customers

December 3, 2020

Twitter

ChannelFutures

Amazon WorkSpaces @awscloud DaaS client will be available on @IGEL_Technology virtual endpoint client OS.… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

.@VMware cutting more workers in California as part of ongoing #workforcerebalancing. #layoffs… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

#CPVirtual is March 2-4. It’s the hottest ticket in town — any town, since it’s 100% online — so make sure you have… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

.@datto, @ThreatLocker partner to streamline #MSP secure business operations. dlvr.it/RtYvJK https://t.co/nKGnwbblNO

February 26, 2021
ChannelFutures

Infographic: Why Partner with Sierra Wireless and GetWireless? dlvr.it/RtYh1m https://t.co/KcBFzXIx7l

February 26, 2021
ChannelFutures

Infographic: The Sierra Wireless Essential Series dlvr.it/RtYgxv https://t.co/CatxbRHzXr

February 26, 2021
ChannelFutures

#Threatprotection is no small matter for #MSSPs. Find out what vendors say you have to do this year to protect your… twitter.com/i/web/status/1…

February 26, 2021
ChannelFutures

Cloud strategies and cybersecurity are key, and #COVID19 will have more impact than #Brexit on U.K. channel, says… twitter.com/i/web/status/1…

February 26, 2021

MSSP Insider

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Channel Partners Online

Want more? Find more channel news and analysis on our sister site, Channel Partners.

Media Kit And Advertising

Want to reach our audience? Access our media kit

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Online
  • Channel Partners Events
  • MSP 501
  • MSSP Insider
  • IoT World Today
  • Webhostingtalk

WORKING WITH US

  • Contact
  • About us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2021 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X