A distributed denial of service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. According to Netscout DDoS Threat Intelligence Report, cybercriminals launched almost 7.9 million DDoS attacks in the first half of 2023, representing a 31% year-over-year increase.
(more…)
IoT Devices: Your Data is only as Secure as your Weakest Link
The holiday season is quickly approaching bringing us holiday joy and cheer as well as the latest IoT (Internet of Things) smart home gadgets. With this in mind, we take a deeper dive into IoT devices and the risk they present to not only your home, but also your business. (more…)
![]()
There is a big misconception that cyber security ends when you leave your place of employment. The fact of the matter is that our new connected, and always on lives are prime targets for cyber criminals. One often ignored aspect is our home networks. (more…)
User Education is Critical to Fending Off Cyber-Attacks
Cyber threats are currently top of mind for stakeholders in every vertical. Our consulting team is fielding many requests for Security Health Assessments (SHA) to help organizations better understand their current risk profile and identify appropriate steps to safeguard company data. These assessments cover a wide variety of company systems and processes with deep analysis of system configurations and the identification of evidence to guarantee systems functionality.The key to ensuring any cyber defense mechanism is successful is ensuring the toolsets in your security portfolio are components of an overall cyber security strategy. (more…)
If you talk to any security expert about securing online accounts, the first thing they will tell you is “enable 2FA.” However if you start looking at the number of accounts where Two-Factor Authentication is purposely turned off or opted out of, you will be surprised at how high the number is. The reason for this is because most end users consider 2FA to be a nuisance, and don’t see the need for it when it comes to securing their accounts. (more…)
I was meeting with a company the other day, and security was naturally brought up. In their opinion, they felt that they had a good handle on security and their overall network — they perform security awareness training, they have a SIEM solution, they have AD monitoring and firewall monitoring, and a plethora of other items that would keep their business safe. Digging in deeper I started asking about what types of incidents they got notified for, and how do they get notified? That was when I realized that they were trying to do everything correctly, but they didn’t actually have the manpower to do everything they wanted. (more…)
Benefits of Microsoft Teams: A Communication and Collaboration HubTeams is Microsoft’s premiere communication and collaboration tool. It has now replaced Skype, which was strictly a chat and calling platform; however, Teams’ capabilities are far greater than its predecessor. It is a four-in-one shared workplace that streamlines messaging and chat, meetings and file sharing, calling, and app integration.
Businesses often utilize Teams to increase productivity, improve collaboration and enable innovation across their entire organization. (more…)
Thrive Named to ChannelE2E Top 100 Vertical Market MSPs: 2019 Edition
Fourth-Annual List Reveals Leading MSPs In Healthcare, Government, Financial Services, Manufacturing & More
Foxborough, MA, April 29, 2019 — Thrive, a premier provider of Next Generation Managed Services has been named to After Nines Inc.’s ChannelE2E Top 100 Vertical Market MSPs list and research for 2019. The annual list and research identify and honor the top 100 managed services providers (MSPs) in healthcare, government, financial services, manufacturing, legal, not-for-profit and additional vertical markets. (more…)
Thrive Named One of 2019 Tech Elite Solution Providers by CRN®Tech Elite 250 List Recognizes Highest Achieving IT Solution Providers in Vendor Certifications
Thrive proudly announced today that CRN®, a brand of The Channel Company, has named Thrive to its 2019 Tech Elite 250 list. This annual list honors a select group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers, scaled to their company size. These companies have distinguished themselves with multiple, top-level IT certifications, specializations, and partner program designations from the industry’s most prestigious technology providers. (more…)
Personal Cyber Security – How Secure Are You?
Normally I talk about how to setup your work network to be more secure. Today, I want to talk about your personal security. Not physical security, but virtual security. Most people do not want to tinker with their home network. I don’t blame you, neither do I. I just want my home network to work… mostly because if it breaks, then all the kids will come running wondering why the sky is falling.
But for personal technology, there are some practical steps that will help make you more secure.