Category Archives for "Managed Services News"

Jul 29

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 29

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 29

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 29

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 29

Reveille Software Launches First Partner Program

By | Managed Services News

The Reveille platform helps businesses gain insight and visibility into unstructured data.

Thirty-year old Reveille Software has managed for the past three decades without a channel partner program. Those days ended Wednesday with the launch of the Reveille Global Channel Partner Program. It kicks off the company’s channel-led strategy.

The Reveille platform helps businesses gain insight and visibility into unstructured data, or enterprise content management (ECM) and enterprise information management (EIM) systems. Some industry experts estimate that up to 80% of data in any organization is unstructured.

So why create a partner program now?

Reveille Software's Rick Butgereit

Reveille Software’s Rick Butgereit

“As the company was growing, the leadership didn’t want to try to grow the business with the overhead of a large sales force,” Rick Butgereit, executive vice president and channel marketing strategy, told Channel Futures. “What they were learning before I joined in January, was what the customers need in the form of focus in verticals, applications and the ability to do integrations. We believe there is an entire market of companies who do that. Therefore, they can be the trusted adviser for the customer.”

Prior to Reveille Software, Butgereit worked at Infor in various channel roles, beginning in 2006. In addition to Butgereit, the company hired Alex Woodward as director, channel programs and operations. He too previously worked at Infor.

Reveille Software Partner Program Details

The new program targets partners in North America and Europe. Reveille Software is looking for a few dozen reseller and solution provider partners. And the software vendor has specific requirements; in fact, Butgereit is recruiting partners but will consider some not on his target list.

Our most recent list of channel-program updates features new programs and updates to existing ones. So check it out.

There’s an “ideal” channel partner profile that the company has in mind. So, for example, the partner organization has to be at least five years old, have at least four dedicated sales reps, deep ECM domain experience and focus, vertical focus experience and expertise, and more than $20 million in annual revenue, to name a few partner profile requirements. Additionally, the partners must do 80% of business in on-premises sales.

A managed service provider (MSP) partner program is in the works for the broader Reveille partner network. Eighty percent of the MSP business must be managed services to qualify for the MSP program. Expect to hear more about it by the end of the year.

The new partner program is a tiered model — silver, gold and platinum. The company pays partners based on their performance across tiers, regions and markets.

According to Butgereit, customers are likely to be medium-size businesses and enterprises.

There’s a dedicated partner portal that features sales enablement collateral, training materials, deal registration and integrated product support. Partners can also tap into the Reveille Software team for expertise.

Learning Management System in the Works

The vendor has a specific training curriculum, and requirements, for partners across sales, solutions engineering and services.

The vendor is building out its learning management system, an education and training program for partners.

“Anything they want access to, they’ll be able to get in a component style, so they won’t have to download an entire document when it’s updated,” said Butgereit.

The learning management system will be ready by the end of the year.

“We believe we’re putting a program out there that is going to be attractive. It allows partners to create services and products that drive higher partner margin along with lucrative margin for us. But it  addresses key challenges that their customers are already seeing,” said Butgereit.

Jul 29

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 29

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 29

MSP 501 Flashback: Catching Up with 2019 Lifetime Achievement Award Winner Iuvo Technologies

By | Managed Services News

Bryon Beilman won the MSP 501 2019 Lifetime Achievement Award. And the co-founder and CEO of Iuvo Technologies says he “was completely shocked” to receive the honor.

Iuvo Technologies' Bryon Beilman

Iuvo Technologies’ Bryon Beilman

“I didn’t even know that I was submitted for it,” he said.

The Lifetime Achievement Award goes to an executive who has demonstrated commitment, perseverance, creativity and ingenuity over an entire career. And Beilman certainly has all those qualities in spades. He and Jeff Ouellette founded Iuvo in 2007. Their goal was to empower businesses and help them increase profitability through technology. The company thrived. From 2015-2017, they were one of Inc. 5000’s fastest growing companies. From 2016-2018, the Boston Business Journal named Iuvo to its list of 50 Fastest-Growing Companies. And in 2016, it got a SmartCEO Future 50 Award for the Boston area.

At the heart of their success, according to Beilman, is the ability to couple IT expertise with a real, person-to-person connection with their customers.

“I think the success really is relationships and finding the right people who share the same values, same core values,” he said. “For the last 13 years at this company, that’s what I’ve been focusing on. I try to find people who are better than me in various aspects and that fit the criteria of being good people and collaborators, and building a good team.”

“It comes down to the ability to relate to people,” he said. “IT is all about bits and bytes, but behind that is these tools that we’re using every day to help people do great things.”

“It’s all about people.”

A People-Centric Culture

Beilman sees the people-centric business model he has helped develop at Iuvo as being central to the company’s ability to hold steady during the pandemic and help their customers do the same. Most clients were slow to respond to the shift to employees working from home. But they soon realized how ill-prepared they were to deal with a remote workforce and asked for help — the sooner, the better.

“We were in the right place at the right time for that,” he said. “We were able to buckle down and do what we needed to do.”

“Our culture is one of pushing out leadership toward the edges,” he said. “Our team is empowered to take care of their customers however they want. They have a framework. They have the tools.”

While 2020’s been a rough year, Beilman says he feels “super confident” about Iuvo’s future.

“It’s not going to be a banner year from a revenue point of view,” he said. “As a matter of fact, we’ve had to make some adjustments. But we’re not getting rid of any people. We’ve got a great team and we’ve been able to build on some things.”

He also supports the widely held view that telecommuting will become a permanent option in many companies.

“I think people are going to work remotely,” he said. “They’re realizing, ‘Hey, we can still be very productive. We’re still getting a lot done.’ Maybe people are getting a little sick of Zoom and Teams at times, but I think that option to work from home is going to continue.

“What’s going to happen in the future? I think there’s still going to be some pressure on businesses to figure out how they’re going to do things — especially in the consumer space. We’re not in the consumer space, we’re B2B. But there may be some trickle down that happens to all of us. We’re resilient and we’re trying to keep our ear to the ground and offer the best quality we can,” said Beilman.

Jul 29

Phishing Report: Hook Line & Sinker

By | Managed Services News

When we talk about phishing, it might conjure up memories of scam emails from foreign princes, chock-full of terrible typos, grammar mistakes, and other easy-to-spot signs that the message might not be legitimate. If you’re thinking in those terms, it might shock you to find out how many people actually fall for such attacks.

In partnership with Wakefield Research, Carbonite surveyed 4,000 office workers across the U.S., U.K., Australia, and Japan on their phishing knowledge and clicking habits. It then consulted with Dr. Cleotilde Gonzalez, research professor in the Department of Social and Decision Sciences at Carnegie Mellon University, to gain a deeper insight into the question: what is it that makes people click?

This report digs deeper into the survey results and present Carbonite’s own understanding of these statistics, as well as analysis from Dr. Gonzalez, insights from cybersecurity experts, real-world phishing stories from customers and partners, and tips on how to stay safe from phishing threats.

Brought to you by:
Carbonite program logo

Jul 29

IBM: Mega Data Breach Costs Jump by Millions

By | Managed Services News

The costliest type of threat actor examined in the report? Nation-states.

Mega data breach costs have soared by the millions in the past year while security automation technologies help reduce those costs by one half.

That’s according to the 2020 Cost of a Data Breach Report sponsored by IBM and conducted by the Ponemon Institute. The results are from interviews with 3,200 security professionals in organizations suffering a data breach in the past year.

A mega data breach exposing 40-50 million records now costs companies an average of $364 million. That’s up $19 million from a year ago.

And breaches in which over 50 million records were compromised cost companies $392 million. That’s up from $388 million in the previous report.

Wendi Whitmore is vice president of IBM X-Force Threat Intelligence.

IBM's Wendi Whitmore

IBM’s Wendi Whitmore

“It’s likely that organizations will experience higher breach costs in the future due to the global shift to remote work and the subsequent longer breach lifecycles that are forecasted in the report,” she said. “But in general, I think organizations are becoming more cyber aware. Regulations are also pushing companies to improve their data governance and security controls, enabling businesses to have better control of their data.”

Automation Reduces Data Breach Impact

Companies that fully deployed security automation technologies experienced less than half the data breach costs compared to those who haven’t. Security automation technologies leverage artificial intelligence, analytics and automated orchestration to identify and respond to security threats.

“When you’re able to identify a potential incident fast, containing it becomes an easier process,” Whitmore said. “Similarly, we’re seeing incident response teams and playbooks can equip businesses with the readiness needed to effectively thwart off an attack. Additionally, testing those incident response plans allows organizations to experience the heat of a breach and practice their response, without the risk associated to an actual incident occurring.”

In incidents where attackers accessed corporate networks using stolen or compromised credentials, businesses saw nearly $1 million higher data breach costs compared to the global average. That has reached nearly $4.8 million per data breach. Exploiting third-party vulnerabilities was the second costliest root cause of malicious breaches, at $4.5 million.

The costliest type of threat actor examined in the report? Nation-states. State-sponsored attacks averaged $4.43 million in data breach costs, surpassing both financially motivated cybercriminals and hacktivists.

Stolen or compromised credentials and cloud misconfigurations were the most common causes of malicious breaches for companies in the report. Those represented nearly 40% of malicious incidents.

MSSPs and Automation

MSSPs can take advantage of automation to connect their tools in a more streamlined way in order to speed response efforts and help clients reduce costs associated with investigation and recovery from an incident,” Whitmore said.

A simple step to fend off attacks is implementing multifactor authentication (MFA), she said.

“This is becoming more and more essential as employees are operating in hybrid environments,” Whitmore said. “This extra layer of defense allows users to maintain control of their accounts by requiring that second and separate form of authentication/verification. Also, it’s important that businesses adopt SaaS security models as cloud-enabled security services improves security teams’ visibility. This allows them to see previous blind spots across the environment and more effectively detect suspicious activity.”

>