Operations | Monitoring | ITSM | DevOps | Cloud

N-able

What Is Credential Stuffing and How Do You Prevent It?

In their effort to protect their customers from a range of modern threats, managed services providers (MSPs) may encounter a strategy known as credential stuffing. This hacking technique involves rapidly inserting large numbers of usernames and passwords—often collected from corporate data breaches—into the login fields of other sites and digital services.

Why should you audit privileged access management?

To pull off a data breach, today’s cybercriminals have some formidable tools at their disposal. They can use software to guess simple passwords. They may infect a system with ransomware, only returning stolen information when they’re received payment. They might choose to deploy a social engineering attack and gain access to a network through human error.

Mail Assure achieves top result in Virus Bulletin testing

We’re pleased to announce that N-able™ Mail Assure has received a top result in an independent test conducted by the Virus Bulletin, an industry-renowned test laboratory and an important reference for specialists and businesses concerned with computer security. So, what exactly is this test and how did Mail Assure achieve such a great score?

What does a mature MSP actually look like?

We talk a lot about MSP maturity, but I wanted to take the opportunity in this blog to really consider what that maturity actually looks like. For starters, I believe there are three key areas of excellence that currently define maturity in an MSP business: In all these areas, mature MSPs are constantly tweaking the dial and making ongoing investments.

N-able Backup: The Cloud-First Data Protection Solution

Yes, data volumes are growing, but online backup doesn’t need to be a loss leader—or a break-even solution. Simplify your approach with the N‑able™ Backup solution. Scale with your customers’ growth and turn backup services into a driver of profitability for your business. · Protect your customers’ data, wherever it is.· Minimize human error and improve efficiency.· Deliver higher levels of service.· Outsmart ransomware with direct-to-cloud backups.· Back up more frequently, and archive data longer, at no extra cost.