
Tip Tuesday: Improve cash flow with effective billing practices
If you’ve been a managed service provider (MSP) for a while, you’ve likely encountered demanding customers and overdue accounts. While there’s no foolproof way to completely resolve this challenge, improving your billing practices can help reduce the issue. Continue reading...

MSP Training: How often and what kind?
According to Barracuda Network’s Evolving Landscape of the MSP 2024 report, 38 percent of managed service providers (MSPs) offer security awareness training (SAT). However, experts say that the percentage should be much higher because of the high return on investment...
Sales & Marketing

Your flight plan for MSP Success: Knowing your audience and value proposition
For managed service providers (MSPs) striving to grow and stand out in a competitive market, a clear and actionable marketing strategy is essential. Much like preparing for a successful flight, knowing your audience and defining your unique value proposition are...

What does it mean to be a PRO MSP?
At my managed service provider (MSP) marketing agency, Tech Pro Marketing, the word PRO is in our name, but in recent years, it’s also become somewhat of a mantra. To me, it’s all about results and relationships. Results are everything...
Security

Cybersecurity Threat Advisory: New RAT malware
Microsoft has issued a warning about a new, sophisticated remote access trojan (RAT) called StilachiRAT. Threat actors are actively using StilachiRAT to evade detection to establish persistent access to compromised systems. Continue reading this Cybersecurity Threat Advisory to protect your...

Cybersecurity Threat Advisory: Critical AMI BMC vulnerability
AMI has disclosed a critical vulnerability, CVE-2024-54085, with a CVSS score of 10.0. This vulnerability allows attackers to gain remote access and execute malicious commands. Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is...

Cybersecurity Threat Advisory: Apache Tomcat vulnerability
A severe remote code execution (RCE) vulnerability in Apache Tomcat, identified as CVE-2025-24813, is actively exploited in the wild, allowing attackers to gain server control using a simple PUT request. Review the details in this Cybersecurity Threat Advisory to learn...
Better Business

MSP opportunity: Tackling the chronic waste of cloud resources
Two reports reveal that most organizations have made little progress in optimizing their cloud infrastructure resource consumption. This gap presents a unique opportunity for managed service providers (MSPs) to address the growing demand for expertise in this area. Insights into...

Tip Tuesday: How to conduct a post-incident review and why it matters
Managed service providers (MSPs) know that security incidents are inevitable. They could be a phishing attack, a misconfiguration, or a system outage. Regardless of how one occurs, what truly matters is how you respond to and learn from these events....

The rise of cloud marketplaces: What’s fueling the growth?
According to a 2025 Key Issues and Prediction Report from The Futurum Group, more than a third of all deals moving through cloud marketplaces now involve some type of channel partner. Alex Smith is vice president and practice lead for...
Tech Insight

Tech Time Warp: The 10-day takeover of a botnet
In 2009, researchers from the University of California, Santa Barbara, outsmarted the cybercriminals behind the notorious Torpig botnet. They uncovered critical knowledge about how this type of malware works. Learn how in this edition of Tech Time Warp. Researchers first...

Pioneers in Tech: Margaret Hamilton sends man to the moon
The photo is iconic: A young woman stands next to almost 20 bound books, the stack of books nearly as tall as her (though she appears to have a slight heel in the shoes complementing her very 1960s shift dress)....

Tech Time Warp: The great Michelangelo scare
Thirty years ago, PC users worldwide were left saying “Huh?” after the much-hyped Michelangelo virus turned out to be, well, not much. Learn what the virus’ enduring legacy might say more about the media than about a security risk in...