Results for: bookshelf

Social engineering: a hacker’s most effective weapon

Social engineering: a hacker’s most effective weapon

What is the weakest link in your client’s network? It’s not unpatched software (although you should patch) or the unimaginative passwords (although you should change it). The weakest links are humans themselves. It’s Joan in accounting or Stan in human...

/ May 22, 2019 / 1 Comment
3 leadership books every MSP should read

3 leadership books every MSP should read

An integral aspect of any business is looking for new ways and ideas on how to improve your business practices from within. If your MSP can accomplish this, every area of the business will benefit — from customer satisfaction to...

/ January 14, 2019 / 1 Comment
How easily are you FOOLED by a rookie in an expert’s costume?

How easily are you FOOLED by a rookie in an expert’s costume?

John Edwards, the psychic medium known for talking to people’s dead relatives, makes millions selling tickets to two-hour events all over the world. At these events, he performs (key word: PERFORMS) his psychic feat to people wanting to believe in...

/ November 30, 2018 / 1 Comment
cybersecurity attacks
IT service providers are now focus of cybersecurity attacks

IT service providers are now focus of cybersecurity attacks

Most IT service providers are used to being the defenders of the cybersecurity realm. But, a new report published today by Trustwave, a managed security services provider (MSSP), suggests services providers themselves are increasingly becoming the targets of cybersecurity attacks....

/ April 5, 2018
threat detection
Threat detection emerges as major opportunity for MSPs

Threat detection emerges as major opportunity for MSPs

Threat detection appears to be all the rage when it comes to IT security. Both Amazon Web Services (AWS) and Google are becoming much more focused on providing threat detection services. In the case of AWS, that means acquiring sqrll,...

/ January 25, 2018