Results for: bookshelf
Social engineering: a hacker’s most effective weapon
What is the weakest link in your client’s network? It’s not unpatched software (although you should patch) or the unimaginative passwords (although you should change it). The weakest links are humans themselves. It’s Joan in accounting or Stan in human...
3 leadership books every MSP should read
An integral aspect of any business is looking for new ways and ideas on how to improve your business practices from within. If your MSP can accomplish this, every area of the business will benefit — from customer satisfaction to...
How easily are you FOOLED by a rookie in an expert’s costume?
John Edwards, the psychic medium known for talking to people’s dead relatives, makes millions selling tickets to two-hour events all over the world. At these events, he performs (key word: PERFORMS) his psychic feat to people wanting to believe in...
IT service providers are now focus of cybersecurity attacks
Most IT service providers are used to being the defenders of the cybersecurity realm. But, a new report published today by Trustwave, a managed security services provider (MSSP), suggests services providers themselves are increasingly becoming the targets of cybersecurity attacks....
Threat detection emerges as major opportunity for MSPs
Threat detection appears to be all the rage when it comes to IT security. Both Amazon Web Services (AWS) and Google are becoming much more focused on providing threat detection services. In the case of AWS, that means acquiring sqrll,...