SKOUT-Cybersecurity-W@Small

Our resource library focuses on MSPs and cybersecurity. We provide information and insights on the channel, new threats, solutions, and product updates.

Resources

Screen Shot 2019-08-29 at 4.06.24 PM
LMS Case Study
Clients began to ask LMS about their capabilities in cybersecurity. LMS, as well as its client base, noticed an uptick in cyber attacks, and security was becoming a core pressing need. LMS offered basic security measures such as firewalls, spam blockers and antivirus software but didn’t have a holistic platform, like SKOUT Security Monitoring, to protect their clients from sophisticated threats.
cutting bait1
Cutting Bait: How to Identify, Avoid, and Protect Against Phishing
Many individuals and smaller companies assume that they won't be the target of a cyber attack just because they're not important enough to be on anyone's radar. There's a few things wrong with that kind of thinking, but first and foremost don't sell yourself short. Everyone's data has a monetary value attached to it.
Screen Shot 2019-08-28 at 3.55.27 PM
Anybody Home? Penetration Testing vs. Vulnerability Scanning
Vulnerability scans and penetration tests are definitely two different things. To put this in simple terms, one is a professional checking each door and window to make sure they have locks, the other is someone purposely trying to break in to see if the locks are working.
Screen Shot 2019-08-29 at 11.36.33 AM
Privacy vs. Security
Unfortunately, privacy and security are two different things when we’re speaking about technology. Strengthening one can weaken the other, and vice versa. This is a really complex topic, but let’s try to break it down into component parts and remove some of the mystery.
managed security for msps
Managed Security for MSPs
The roles of the SOC and the NOC are fundamentally different. Both are responsible for identifying, investigating, prioritizing, escalating, and resolving issues, but the problems they are asked with solving are not the same and require different skills and backgrounds.
Screen Shot 2019-08-29 at 4.14.31 PM
Threat Update: Family Offices
Having an effective cybersecurity plan at a Family Office is not only good business practice, but an increasingly necessary component of risk management. The 4,500+ Family Offices in North America are being targeted by cyberattacks due to the large amount of wealth being managed and the high profile individuals associated with the businesses.
Screen Shot 2019-09-12 at 2.51.37 PM
Security Monitoring Product Brochure
SKOUT Security Monitoring uses a combination of best-in-class technology, cutting-edge analytics, and artificial intelligence to monitor and protect organizations. The solution is a comprehensive platform that is easy for businesses to implement but never sacrifices security. SKOUT Security Monitoring is a cloud-native, streaming data analytics platform that includes a fully managed SIEM and a team of experts to decipher and remediate alerts — no matter if your systems are on-premises, in the cloud, or both.
Screen Shot 2019-09-12 at 2.52.01 PM
Email Protection Product Brochure
SKOUT Email Protection is a cloud-based email security solution that blocks spam, malware, and — most importantly — phishing attacks. Our solution catches everything by utilizing computer vision, artificial intelligence and machine learning. Driven, curious, mobile, and growing smarter by the subject line, SKOUT Email Protection adds an important layer of protection to your inbox.
Screen Shot 2019-09-12 at 2.52.29 PM
Endpoint Protection Product Brochure
SKOUT Endpoint Protection is an integrated threat prevention solution that utilizes CylancePROTECT® and our own streaming analytics platform. The solution combines the power of artificial intelligence (AI) to block malware infections with additional security controls that safeguard against script-based, fileless, memory, and external device-based attacks and is backed by our Security Operations Center.
What is Phishing_Page_1
What is Phishing?
Phishing is simply the act of using bait (like an urgent request to log into a website) to get a user to do something they normally would not do. Since phishing attacks are relatively easy to perform, they’ve become a favorite tool of threat actors around the world looking to break into systems and steal information. A phishing attack starts with a list of email addresses.
Real-World Mobile Security_Page_1
Real World Mobile Security
Today’s reader question: “Is there any way to secure mobile devices that I can do myself?” This is one of those areas of security that does have a “good news” kind of answer. There are many things you can do to help secure your own mobile devices that don’t require large amounts of time, money, or your company’s direct intervention.
Onedrive Hosting Malicious Files_Page_1
OneDrive Hosting Malicious Files
One of our readers asked: “I saw an article online that said that OneDrive was hosting a ton of malicious files. Is that true? Do I need to be worried?” This is not incorrect, but the worry factor is limited. Let’s take a look at what’s going on and how to protect yourself.
Nothing is Ever Really Free_Page_1
Nothing is Ever Truly Free
A reader wrote in to ask: “I saw that someone was sending out fake free Steam games, but that it was actually a phishing scheme to steal your credentials. Is it a real threat?” Yup, it is. It seems that the latest trick of phishing scammers is to try to get you to sign in to your Steam account in order to steal your username and password when you enter it into the fake site they send you to. The bait for this phish? They’re offering a free game if you follow the link and log in.
Medical Lab Provider Breach_Page_1
Medical Lab Provider Breaches
One of our readers asked: “I saw the news stories about Quest Diagnostics and LabCorp both getting breached. What happened, and should I be worried about it?” To set the record absolutely straight, neither of those companies actually got breached – technically. Data from both companies that was being held by a billing company was acquired by threat actors directly from that third-party company. The end result doesn’t change very much, but it’s good to make sure we’re following the path of this incident fully.
Managed SIEM vs MSSP_Page_1
Managed SIEM vs. MSSP
A reader recently asked: “What’s the difference between a Managed SIEM Service and a Managed Security Service Provider?”  It’s a question that doesn’t get asked often enough, and the differences can range from “pretty big” to “insanely different.”  Let’s dive a bit deeper and see what sets these two types of services apart
Honda Breach_Page_1
Honda Breach
A reader recently asked: “There were news reports that Honda had a breach.  I’ve bought a Honda recently, should I be worried?” In this case, while you may need to be a bit more careful and on the lookout for phishing schemes, no there isn’t much reason to be worried.
De-Worming Windows_Page_1
De-Worming Windows
A reader recently asked: “The news is talking about a new threat on Windows machines that can spread like the WannaCry attack did. Is it real, and what can I do about it?” It’s very real. Microsoft released guidance via their TechNet website that detailed a newly discovered vulnerability in versions of Windows Server 2008 R2 and earlier as well as Windows 7 and earlier on the desktop side.  Here’s what you need to know:
Basic Rules for Connected Kids_Page_1
Basic Rules for Connected Kids
A reader recently asked: “I’ve got kids, one in grammar school and one in high school.  What can I do to keep them safe online at home at everywhere else?” Keeping kids safe is always a top issue we hear about in Cybersecurity. The most common question in a world where young people are often much more connected than their parents and guardians is “Where do we even start?”
Too Many Breaches_Page_1
Too Many Breaches
A reader recently asked: “Why has there been such a large number of breaches in the last couple of months?” First things first, we should note that what’s actually been happening is an increase in breach reporting - the public disclosure of breaches and how many are impacted by them. While there has been a rise in breach activity overall, the total number of breaches has not increased overwhelmingly, though they have grown in the scope and impact of individual breaches.
What is Disinformation_Page_1
What is Disinformation
A reader recently asked: “What is disinformation, and why does it come up in articles and news stories about Cybersecurity?” Disinformation is a very old technique in the physical world. While it was formally coined as a term in the Soviet Union, military campaigns have used disinformation to force enemies to make mistakes or erode support at home since humans figured out the very basics of psychology and covert operations. Today, it’s used for a variety of purposes well beyond the battlefield, and some of those enter into the realm of Operational Security (OpSec) and reputation monitoring - components of Cybersecurity.
Why Are MSPs Such a Big Target_Page_1
Why are MSPs Such a Big Target
A reader recently asked: “Managed Service Providers have been targeted for a lot of attacks recently. We use an MSP, so I want to know why they’re such a big target and how can I defend my company?” Managed Service Providers (MSP’s) are companies that provide technology and telephony services from simple project assistance to complete outsourced IT operations. Over the past several months, they have become the target of several major cyber attacks, and that has left many customers asking the same questions you have.
Increasing-Revenue-with-Cybersecurity-Webinar-image
On-Demand Webinar: Increasing Recurring Revenue with Cybersecurity
Download our webinar hosted by SKOUT Chief Revenue Officer, Mike Hanauer and Solutions Architect, Mike Denapoli to learn how MSPs can add additional recurring revenue streams by adding a cybersecurity offering.