
Nurturing authentic partnerships in the security vendor landscape
In the fast-paced world of security technology, vendors often find themselves in a ‘speed-dating’ cycle with customers and partners. The rush to present solutions and secure contracts can hinder the development of meaningful relationships, which are essential for long-term success....

Cybersecurity cutbacks require resilient MSPs
As more organizations encounter economic headwinds, the rate at which cybersecurity budgets have been increasing is slowing down. A survey of 550 Chief Information Security Officers (CISOs) conducted by IANS Research and Artico Search finds cybersecurity budgets only increased an...

Tip Tuesday: Minimize shadow IT risks through communication
Although shadow IT (any IT resource used by employees or end users without the IT department’s approval or oversight) practices come with a laundry list of risks, people often insist on using them. In this edition of Tip Tuesday, we’ll...

Shields up: How MSPs can advance cybersecurity with cutting-edge technologies
“Bottoms up” is a good-natured toast or nudge to get one to finish their drink. The Cybersecurity and Infrastructure Security Agency (CISA) is introducing a good-natured nudge to get organizations to finish their resiliency called “Shields Up!” You probably won’t...
Sales & Marketing

10 essentials to creating the ultimate LinkedIn company page
With 930 million members on LinkedIn, your company page isn’t just a place to post pictures from the company picnic. It is also your virtual handshake to a global audience. This is your opportunity to make a lasting impression and...

The role of brand archetypes in MSP websites
One thing we always hear from MSPs during the discovery phase is they want to be different. At my MSP marketing company – Tech Pro Marketing – we manage websites and lead generation for growing MSPs. Most of the MSPs that...
Security

Cybersecurity Threat Advisory: Citrix Bleed vulnerability actively exploited
Recently, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a cybersecurity advisory warning that ransomware groups are actively exploiting the ‘Citrix Bleed’ vulnerability. In this Cybersecurity Threat Advisory, we look at the Citrix...

Cybersecurity Threat Advisory: New vulnerability for Windows users
A new vulnerability has been identified which could compromise the security of Windows users. The vulnerability discussed in this Cybersecurity Threat Advisory, known as “forced authentication,” gives an attacker access to a user’s NT LAN Manager (NTLM) tokens by tricking...

High demand for managed cloud services bodes well for MSPs
A survey of 500 IT decision-makers from North America, the United Kingdom, Benelux, and Australia finds that 93 percent plan to prioritize investing in cloud-managed services in the next 12 months, with respondents claiming cloud-managed services could increase productivity by...
Better Business

Optimizing resources to take your MSP business to the next level
As an MSP, it is imperative to maximize profits while minimizing costs. However, cutting corners to lower capital and operating expenses can be disastrous: platforms can suffer from lower availability and stability levels, which can lead to unsatisfied customers. The...

Becoming a smarter MSP with AI-powered automation
The problem with being a ‘smarter’ MSP is that it may often require investment. For those who don’t have a rainy day fund set aside, it would mean dipping into the revenue to stay competitive and maintain margin, which can...
Tech Insight

Tech Time Warp: Kenzero more than Kenough in terms of problems
It was obvious in the late 1990s and early 2000s—the heyday of peer-to-peer (P2P) file-sharing networks—that the concept was too good to be true. In this edition of Tech Time Warp, we will take a look at, aside from the...

Tech Time Warp: Origins of the term “computer virus”
Now, nearly four years since the word “coronavirus” entered the popular lexicon, who doesn’t feel like an amateur epidemiologist? Given world events, it should be easy to understand why Leonard Adleman—the “A” of the RSA algorithm—was inspired by the graduate...

The race to deliver managed generative AI services is on
While there is a massive amount of interest in all things relating to generative artificial intelligence (AI), the number of organizations that have the skills and resources required to fully exploit it remains limited. Under the hood of generative AI...