Skip to main content

MSP & MSSP & IT Industry Notes Janaury 15th

 

Sponsored by

January 15th, 2024

Arcoa Group

Why partnering with ARCOA makes sense
Electronics Recycling is an important and profitable part of the IT asset lifecycle, but it can be overwhelming with all you already do, varying state regulations, and the limited resources at hand. That’s where ARCOA comes in. When you partner with ARCOA, you get all the benefits of a big company without any of the capital investment. We’ve been doing this since 1989 and have the expertise, certifications, and nationwide resources to get the most for all your clients’ retired IT assets. Plus, positioning your clients as environmental stewards not only elevates their appeal to consumers, it meets government requirements and avoids fines.

What partnering with ARCOA looks like
Our role is to make it easy for you to bring more value to your clients. We work with you to help stretch your clients’ IT budget by reducing the total cost of ownership of their electronics. We’re experts at identifying and implementing the solutions your clients need for the end-of-use re-marketing, recovery, and recycling of their technology assets. The sooner you involve ARCOA, the sooner you and your client.

Touch7 Announces Full Compliance with Adobe Creative Cloud 2024

  • Touch7 Color System is now fully compliant with Adobe Creative Cloud 2024.
  • Graphic designers and printers can easily add neon and pastel colors to designs using Touch7, with just a few clicks.
  • Color-Logic develops color communication systems and software tool sets for special effect printing applications, providing brand owners and designers the ability to differentiate themselves with dynamic print results.

Lexmark Leaps Into NRF 2024 With New Connected Retail Solution That Delivers Personalized Content for Retailers

  • Lexmark to showcase retail-ready printers and solutions at NRF 2024 from Jan. 14 to 16 in New York at booth #5810.
  • Featured product: Lexmark Engagement Automation Platform (LEAP) enables retailers to drive sales and foot traffic through hyper-localized social media ads.
  • LEAP supports retailers with engagement, automation, and loyalty applications for personalized promotions and offers.
  • Other offerings at NRF include solutions for control and visibility with a single signage platform, customer attraction and engagement, retail-rugged devices, cloud-based savings, and environmentally sustainable technologies.
  • Lexmark focuses on creating cloud-enabled imaging and IoT technologies to transform information into insights and drive business outcomes.

SentinelOne® Positioned as a Leader in the Gartner® Magic Quadrant™ for Endpoint Protection Platforms for Third Consecutive Year

  • SentinelOne is a three-time Leader in Gartner's Magic Quadrant for Endpoint Protection Platforms, showcasing its consistent leadership.
  • Company invests in AI-powered security technology to tackle complex threats and protect against an expanding attack surface.
  • Singularity Platform provides top-notch endpoint protection, covering endpoints, cloud, data, and identity. It includes AI-powered detections, autonomous controls, and proactive security management.
  • With over 1,460 positive reviews on Gartner Peer Insights, SentinelOne is highly rated for its proactive threat prevention, machine learning algorithms, and automation capabilities.

Codestone recognized as a Top 50 Managed IT Service Provider

  • Named industry leader for Cloud and Managed Services, enhancing the company's collection of industry accolades.
  • Achieved #1 EMEA/UK Partner for SAP, Microsoft Gold Partner with multiple accreditations, and other specialist designations, showcasing versatility.
  • Underwent a rigorous assessment in twelve crucial business areas, reflecting a commitment to excellence and precision scoring by a Business Intelligence AI algorithm.
  • Emphasized dedication to customer service excellence, with plans for further enhancements in 2024, demonstrating a customer-focused approach.

Magna5 Highlights Strong 2023 Results as the Demand for Managed IT Services Continues to Grow

  • Magna5 achieved a remarkable 50% revenue increase in 2023, nearly double the industry growth rate.
  • Completed two strategic acquisitions, expanding market presence in core geographic areas.
  • Ended 2023 with over 220 skilled professionals, serving 700 clients across 37 states from 6 regional centers.
  • Recognized on the Inc. 5000 list, MSP 501 ranking, and CRN's MSP 500 list, showcasing innovation and leadership.

CrowdStrike Named a Leader in 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms

  • Named Leader in 2023 Gartner Magic Quadrant for EPP for the fourth time, showcasing consistent market dominance and innovation.
  • Positioned furthest right for Completeness of Vision and highest for Ability to Execute, indicating strong strategic vision and effective execution.
  • Falcon XDR platform, an AI-native solution, effectively analyzes trillions of security events to stop breaches at machine speed.
  • Revolutionary single-agent Falcon platform provides industry-leading protection across endpoints, cloud, identities, and data, reducing costs and complexity.
  • CrowdStrike's Falcon Complete MDR service, recognized by Gartner, offers 24/7 management, monitoring, threat hunting, and remediation, addressing cybersecurity skills gap.

Accenture to Acquire Navisite to Help Clients Modernize and Reinvent Their Businesses with Cloud

  • Accenture acquires Navisite to enhance application and infrastructure services, aiding North American clients in IT modernization for the AI era.
  • Navisite contributes 1,500 team members, including 400 cloud engineers with 2,000 certifications, strengthening Accenture's capabilities in cloud transformations.
  • Aims to help clients reinvent businesses by embracing new technologies, with Navisite's team supporting areas like cloud, infrastructure, and application services.
  • Collaboration focuses on scaling services, providing guidance for modernization, and creating agile, resilient businesses, aligning with both companies' growth objectives.

Synagex Acquires Ascentek in Merger of Managed IT Service Providers.

  • Synagex strengthens its service portfolio through Ascentek acquisition.
  • Synagex's cybersecurity proficiency, including the Cybersecurity Maturity Model, enhances defense against evolving threats.
  • Merger addresses challenges in dynamic IT landscapes, providing robust support to diverse sectors.
  • Ascentek's founder, Ted Frederick, becomes CTO, ensuring smooth leadership transition.
  • Synagex expands its reach, serving various industries and U.S. cities remotely.

Five tips to make digital transformation work

  • Reported in IMD.org
  • Software Flexibility:
    • Leverage software's adaptability for continuous refinement based on user feedback.
  • User Experience Measurement:
    • Use tools like Medallia to assess both customer and employee experiences continuously.
    • Employ a "launch and listen" approach for prompt resolution of user-identified issues
  • Strategic Issue Prioritization:
    • Apply the Pareto Principle to focus resources on the most impactful 20% of issues.
  • Cost Perspective Shift:
    • Include ongoing improvement costs in the project budget, recognizing decreasing costs over time.

Cybersecurity Notes

  • We estimate that ransomware attacks killed between 42 and 67 Medicare patients”, in a report published by the University of Minnesota School of Public Health
  • In 2023, 2,207 hospitals, schools and governments were directly impacted by ransomware.
  • Fallon Ambulance Service of Boston, Massachusetts notified 911,000 patients that their PHI was exposed after cyber attack.
  • KCTV is reporting that Liberty Hospital of Missouri is cutting employee hours as a result of cyber attack that hit hospital in 12/2023.
  • Fred Hutchinson Cancer Center of Seattle, WA reports that hackers threatened to “swat” patients if hospital did not pay ransom after ransomware attack in 12/2023.
  • HealthEC Software of Edison, New Jersey notified 4,452,782 patients that their PHI may have been exposed after cyber attack.
  • Orrick, Herrington & Sutcliffe, a law firm headquartered in San Francisco, CA, disclosed that more than 600,000 individuals were impacted by a data breach that happened in early 2023.
  • Carthage (N.Y.) Area Hospital, Ogdensburg, N.Y.-based Claxton-Hepburn Medical Center and Watertown, N.Y.-based North Country Orthopaedic Group filed a lawsuit Nov. 29 alleging that the unknown individuals "conspired to carry out the complex cybercrime and movement of stolen
    "
    • lawsuit against the LockBit members was initiated to empower the hospital group, known asNorth Star Health Alliance, to issue a subpoena compelling Boston-based cloud storage firm Wasabi Technologies to surrender data that LockBit stole from the hospital group in a data breach that took place on Aug. 31.

Lock in on Cyber Security with ARCOA

  • IT Asset Disposition (ITAD): Manages the secure disposition of end-of-life IT equipment
  • Data Destruction: Ensures sensitive data is completely erased from devices before disposal
  • Asset Remarketing: Resells refurbished IT assets to maximize value recovery
  • Recycling Services: Provides environmentally responsible recycling of electronics
  • Compliance & Reporting: Offers documentation and reporting to meet regulatory standards
  • Secure Logistics: Handles the safe transport of IT assets throughout the disposal proces

Square 9 Unveils Comprehensive Guide For Understanding Document Management

  • Provides a comprehensive document management guide covering features, benefits, implementation, and best practices.
  • Document Management Solutions enhance workplace security, collaboration, and productivity.
  • Guide assists organizations in managing document growth, offering tools for streamlined processes.
  • Offers expertise in content management, accounts payable automation, OCR, and information management for educational institutions and HR.

Trace3 Acquires Tail Wind Informatics To Spearhead Data Strategy Consulting –

  • Acquires Tail Wind Informatics, signaling a deliberate expansion of capabilities.
  • Solidifies its position as a leader in data strategy consulting.
  • Acquisition brings additional expertise, fostering innovation and a broader service range.
  • Aims to gain a competitive edge by combining strengths for a comprehensive service portfolio.
  • Focus on how the acquisition enhances overall value for clients seeking data-driven solutions.

CRITICALSTART® Launches Asset Visibility to Ensure Managed Detection and Response

  • Critical Start launched the Asset Visibility offering as part of Managed Cyber Risk Reduction (MCRR).
  • Purpose of Asset Visibility:
    • Enhances proactive security measures.
    • Identifies assets needing protection, validates endpoint security controls, and pinpoints risk areas.
  • Challenges in Cybersecurity:
    • Organizations face challenges managing cyber risk, maximizing technology, and optimizing costs.
    • Critical Start's 2023 report highlights the struggle with continuous security posture monitoring (90%).
  • Endpoint Security Coverage:
    • Endpoint Security Coverage Gaps included in MDR service at no extra cost.
    • Reveals and mitigates weaknesses in attack surfaces.
  • Components of Asset Visibility:
    • Included with Critical Start MDR:
      • Endpoint Security Coverage Gaps: Identifies risk exposure.
      • Asset Inventory: Provides a consolidated view of assets.
    • Additional Capabilities:
      • Asset Criticality Ratings: Tags assets for prioritized remediation.
      • Unified Host Inventory: Creates a single source of truth.
      • Data Administration and Management: Offers in-depth analysis and reporting.
      • Self-service Integrations: Enables integration for broader asset visibility.

Xerox to terminate over 3,000 employees

Announced new “Reinvention” reorganization plan

  • Includes getting rid of 15% of its total workforce, which is over 3,000 people
  • “decision to reduce our global workforce was a difficult but necessary step toward establishing long
    term viability for Xerox”
  • “cuts will come across all levels and areas of our organization”
  • “simplifying products within core print business”
  • “increasing efficiency across global business services”
  • “boosting focus on IT and other digital services”
  • Executives apparently departing the company include:
    • Mike Pietrunti (U.S. Dealer Partner Leader)
    • Joanne Collins Smee (EVP and President America)
    • Tracey Koziol (EVP of Global Offering Solutions & Chief Product Officer)
  • Leadership team now comprised of:
    • Steve Bandrowczak (CEO)
    • John Bruno (President & COO will lead enterprise print, digital services and IT services)
    • Louie Pastor (Chief Transformation & Administrative Officer)
    • Flor Colon (Chief Legal Officer)
    • Xavier Heiss (CFO)
    • Deena Piquion (Chief Growth & Disruption Officer)
    • Jacques Edouard Gueden (Chief Channel & Partner Officer)
    • Fred Beljaars (Chief Delivery & Supply Chain Officer)
    • Suzan Morno Wade (Chief Human Resources Officer)
    • Chris Fisher (Chief Strategy Officer)

Blue Sky Digital has been acquired by Aurora Managed Services

  • CFI announced that it acted as exclusive financial advisor to Blue Sky Digital in its acquisition by Aurora Managed Service
  • Blue Sky Digital, a leading Managed Print Solutions provider has been sold to Aurora Managed Services
  • combination of Aurora and Blue Sky Digital will enhance both businesses and, importantly, benefit new and existing customers

Kyocera Printers Open to Path Traversal Attacks

  • Nature of Vulnerability:
    • Path Traversal Vulnerability (CVE-2023-50916)
    • Allows attackers logged onto the network to manipulate the backup database path.
    • Attackers can authenticate the path, potentially gaining access to hashed Active Directory credentials.
  • Exploitation Details:
    • Attacker needs network access.
    • Attackers alter the backup database path through manipulation.
    • Kyocera had a safeguard, but it could be bypassed via web interception proxies or direct requests to the application endpoint.
    • Depending on IT settings, the authentication message might contain hashed Active Directory credentials (NTLM hashes), especially if NTLM traffic restriction policies are not enabled for remote servers.
  • Response:
    • Kyocera addressed the vulnerability by releasing a patch in late December.
    • Trustwave researchers initially disclosed the flaw in a blog post.

Attachments

Images (1)
  • mceclip0

If you like something I've posted please feel free to click the "like" button!

Add Comment

Comments (0)

Post
×
×
×
×
Link copied to your clipboard.
×
×