MSPs: Check for This Gap in Your Stack
www.linkedin.com
Attacks are becoming significantly more sophisticated with the advent of AI, evolving into comprehensive strategies that encompass phishing, social engineering, and intelligence gathering. A notable example is the deepfake attack on the British Engineering Group, Arun, which was deceived into transferring $25 million over a zoom call!
My dishwasher stores, processes, and transmits data... Is that an asset really though?
tldr; its a hype curve? So we are hitting a plateau?
How many MSPs have an asset inventory? How many deploy level 1/2 CIS but dont do it themselves?
I think that curve is actually turning downward though
Pun intended? :)
Brandon Casey How sensitive is that data, what connectivity does it have to other things?
Looking forward to this!!!
Schrodinger MSP ... you dont know if they are successful until they die?>
IT Leader | Business Owner | Entrepreneur
3moI mean its a good thought process... Like I am helping implement CIS level 1 right now and I had to explain that their Ring doorbell is VERY important to document. But like their toothbrush isn't. I think the store and process data definition is making me rethink that toothbrush...