You’ve probably heard the expression “love hurts” in the context of a heartbreak, but how about a ransomware attack?
This Valentine’s Day, we’ve heard reports that internet criminals are taking advantage of human emotions with romantically-inspired ransomware attacks. With Valentine Day inspired subject lines – ‘My letter just for you’ or ‘Wrote my thoughts down about you’ – these phishing emails are pulling at the heartstrings. Once the email is opened, victims see a love-letter named attachment that, if downloaded, will immediately install ransomware onto the victim’s computer. This will encrypt the victim’s computer until they pay the determined ransom.
These holiday-specific ransomware attacks are nothing new to consumers, but are increasingly targeting small businesses.
To keep your small business network secure from this type of targeted attacks, experts recommend creating a strong patch management policy. Patches are released when a provider discovers a vulnerability in their system that needs fixing, but organizations are not yet effective at installing these patches when these vulnerabilities are discovered. A 2018 Ponemon Institute report showed that 34% of cyber-attack victims were already aware of a vulnerability prior to being attacked. Small businesses need to have proper patch management in place to address a vulnerability prior to its exploitation by cyber-criminals.
As cyber-criminals become more specific and targeted (and even a little romantic), IT teams need to become more preventative and secure. Patch management is a key step to preventing targeted ransomware attacks and to staying one-step ahead of cyber-criminals.
To learn more about what a cyber-attack costs a small business, check out our infographic here: https://www.logmein.com/central/resources/doingnothing
The workforce has changed, and having the ability to work from anywhere has become the new norm. However, this increase in flexibility has led to an increase in theft or loss of IT assets, so ensuring IT professionals stay ahead of these threats is more important than ever before.
GetApp, a Gartner company, put together the top-rated IT management apps for remote asset monitoring that allows IT professionals to stay ahead of these threats and have more control over their technology assets.
According to user reviews, LogMeIn Central was rated 4.5 out of 5.0, followed by ConnectWise Automate (4.2) and Kaseya VSA (4.0). Pulseway was rated 4.8, and Jamf Pro was rated 4.7 out of 5.0.
Utilizing IT management tools ensures IT professionals keep their companies and employees operational and secure. These solutions offer remote monitoring and control capabilities to help IT professionals track, manage, and protect all technology assets – from anywhere.
LogMeIn Central users particularly liked the following:
- Reviewers are happy with the wide array of customization options and features provided by LogMeIn Central.
- Users say that LogMeIn Central’s mobile access capabilities are reliable and make it easy to connect.
- According to users, LogMeIn Central offers reliable features and is easy-to-use, even if you have to manage 200+ systems remotely.
Explore the article to view what users liked and disliked about each solution here: https://lab.getapp.com/best-it-management-apps-for-remote-monitoring/
By verified product users on G2 Crowd, LogMeIn Central has been awarded the highest rated & easiest to use endpoint management software solution!
On top of those rankings, LogMeIn Central was also given top rankings for having the highest ROI, the smoothest implementation, & being the most usable.
G2 Crowd rankings are based on an algorithm that incorporates real-user satisfaction scores from review data. Thank you to all our users for the positive ratings!
To learn more, visit: https://www.g2crowd.com/categories/endpoint-management
Today, we’re excited to announce a new packaging structure is live for Central, giving our customers more freedom and flexibility to get exactly what they need out of our product. This new structure allows us to position Central as a platform and further expand as a more robust endpoint management solution with the ability to build on future modules based on our customers’ needs.
At Central, we know IT professionals wear a lot of hats, so we’re focused on ensuring our customers get the functionality they need to increase productivity, automate routine IT tasks, and optimize their resource allocation. Central’s new modules allow incoming new customers to prioritize what matters most and get the functionality they need out of their endpoint management solution.
Incoming new customers have the option to purchase our new Base package which has robust functionality and add-on one, two, or all three core functionality modules (Security, Automation, Insight) based on their needs and priorities.
To learn more, please visit: logmein.com/central
We are getting reports from LogMeIn customers about suspicious emails that are designed to look like they are coming from LogMeIn — they have all the hallmarks of phishing attempts.
The reports are meant to look like a LogMeIn email. The email subject line is: “You have earned 6 months of free subscription!”
We want to make it clear that these emails did NOT come from LogMeIn and people should NOT click on the links in these emails.
While we are working with our partners to remove these malicious websites, as part of our commitment to security, we want to make sure our users and the public are aware of this specific email, and provide an easy way for people to identify the tell-tale signs of phishing attacks.
If you have clicked a link in this email, we recommend changing your password and enabling two-factor authentication on your account as well as your users’ accounts.
Email subject line: You have earned 6 months of free subscription
Intended behavior/action: Tries to get you to open the embedded link which then downloads a malicious file.
Last week, we hosted our third Central Master Class on the LogMeIn Client App & One2Many Task Management. These Master Classes are quarterly webinars that are designed to go in-depth into two features of Central to ensure that you are using Central to the best of its abilities.
In this Master Class, we covered:
- The most efficient way to install software and distribute files across multiple computers
- Our top tips for running scripts and automating manual tasks
- How to quickly connect to your remote computers without a web browser
To watch this Master Class as well as previous Master Classes, visit: https://www.logmein.com/central/resources/masterclasses
From passwords resets to corporate network threats, today’s IT teams are increasingly burdened with time-consuming tasks that keep them from more strategic work. With this in mind, we created an informative infographic to demonstrate how your passwords and endpoints might be putting you at risk – and then show you how to address these problems.
We know that IT professionals simply don’t have time for down-time, so ensuring all software solutions are running and work as they should is absolutely critical. LogMeIn Central recently surveyed IT professionals to learn what they consider to be most important in a Remote Monitoring and Endpoint Management solution, and the results were exactly as expected! We confirmed that reliability (works every time) and responsiveness (low latency) are most important, and our customers rate having a very good to excellent experience with us. LogMeIn Central consistently achieves better than 99.99% system up-time, so we’re proud to continue to offer the best-in-class unattended remote access in the market and ensure our software simply works, always.
By a third-party reviewer, LogMeIn Central has been named one of the top 6 endpoint security vendors to watch in 2019. This reviewing site focuses on Endpoint Security & Protection Platforms and posts about best practices when evaluating or maintaining an endpoint solution.
The reviewer writes:
“LogMeIn provides a comprehensive endpoint management and security solution indicative of the blurring lines between identity security and the traditional endpoint perimeter. The LogMeIn Central solution security portfolio includes anti-virus, patch management, proactive alerts, software inventory, and computer health monitoring, thereby providing a comprehensive package for enterprises struggling with perimeter security gaps or visibility issues.”
To learn more, visit: https://solutionsreview.com/endpoint-security/top-6-endpoint-security-vendors-watch/
For small businesses, strong endpoint security is no longer a nice to have, but a necessity to proactively prevent threats and mitigate costs. According to the IDC, 70% of successful breaches begin at an endpoint. In addition, over the past 5 years, the number of breaches targeting small businesses has been on the rise. Small businesses need to improve their endpoint security or it is increasingly likely that they will experience a costly attack.
In honor of National Cyber-Security Awareness month, we investigated the types of endpoint breaches that are impacting small businesses and the most effective ways to proactively mitigate those threats to save costs and keep your endpoints secure.
Learn more on our website at https://www.logmein.com/central/resources/doingnothing