Dthree Peer Learning

Cyberfenders Dthree (“Digital Defence Dojo”) helps cybersecurity professionals unlock greater wisdom and insights through the power of crowd. Dthree is an online peer-to-peer learning group that addresses cybersecurity best practices and share hot topics in a structured way. Led by our team of experts, referencing the NIST Cybersecurity Framework and...

Is Cryptojacking the next wave of cybercrime?

Over the last year and a half, we have seen a rise in ransomware attacks. Some of the big ones were Wannacry (it used Eternal Blue, a package that was created to exploit a vulnerability in Microsoft’s Server Message Block). This vulnerability was discovered by the US National Security Agency...

Unintended consequence of GDPR

As cybersecurity professionals, we can expect the implementation of the European GDPR or General Data Protection Regulations to have many unintended effects on day to day operations of Internet services. One of the most concerning consequences of GDPR is the WHOIS data. Often termed the “Information Super Highway”, the Internet...

Does your business have a dependable cybersecurity framework?

The cyber threat landscape is continually changing, developing, and refining. Every month there are new attacks employed and new vulnerabilities discovered. Some threat-actors sit on zero-day vulnerabilities (unknown and un-fixed holes in computer systems), unleashing them on private and business users alike. Attacks aim to get financial or personal data,...

“Meltdown and Spectre” accessing information at will

Early in December 2017, 3 researchers from the Graz University of Technology in Austria wrote and verified a computer program to test a theory about the safeguards of how computer’s central processors protect access to privileged data stored in memory. Their goal was to bypass the processor’s hardware barrier and...

Humans under fire: Being attacked via Social Media

In previous blogs I discussed how educating users in a business environment would help improve cyber security for the company and empowering the users allows them to carry the awareness back home and further extend the corporate firewall. Hoaxes and chain letters are also a form of virus – they...

The @CRN Tech Innovators Award panel selected our Cost Estimator as a finalist in the 2019 MSP Technology Category! Want to know why? Follow the link and give our Cost Estimator a try. You'll know exactly how much you'll spend on #Azure. https://nerdio.co/2lCR7Rn

#Azure Ephemeral OS disks significantly speed up #WVD. We ran extensive testing on a standard SSD #virtualdesktop vs. ephemeral OS disks. Take a look at the results and take a look at our blog on the topic: https://nerdio.co/2pKPzqu

#WindowsVirtualDesktop is now available! Watch @vadimvl show you how to deploy a WVD in the Nerdio Admin Portal. Then be sure to visit the Nerdio Academy and take a look at our library of #WVD resources. https://nerdio.co/2ptywsY

Are you a new #MSP? @Datto posted 3 tips for new #MSPs on @ChannelE2E. Check out the story to learn more: https://nerdio.co/2mnB4HJ

Securing sensitive data in the #cloud isn't always easy. We're sharing cloud threat protection best practices from the trenches. https://mcafee.ly/2Nl3XjM

Load More...