Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Threat Spotlight: How attackers use inbox rules to evade detection after compromise

Automated email inbox rules are a useful and familiar feature of most email clients. They help people manage their inboxes and the daily flood of wanted and unwanted communications by enabling them to move emails to specific folders, forward them...

/ September 20, 2023
Tip Tuesday
Tip Tuesday: Lead generation for MSP marketing

Tip Tuesday: Lead generation for MSP marketing

This month’s Tip Tuesday dives into how many managed service provider (MSP) businesses need help attracting leads. Instead, they tailor their marketing strategy to focus on something else. While this might help companies in the beginning phases and even attract...

/ September 19, 2023
Digital business transformation plays to the strength of MSPs

Digital business transformation plays to the strength of MSPs

The meaning of digital business transformation has always been in the eye of the beholder. Still, managed service providers (MSPs) should take note of the significant shift towards a greater emphasis on making organizations more resilient and efficient. A survey...

/ September 18, 2023
Cybersecurity on the healthcare edge

Cybersecurity on the healthcare edge

A new report from AT&T on cybersecurity and edge computing highlights a growing area of concern. The report shows that edge computing in healthcare is rapidly increasing,  leading to more vulnerabilities in cybersecurity. These vulnerabilities, however, can be turned into...

/ September 14, 2023

Sales & Marketing

Cold-calling
Ask an MSP Expert: Mastering cold-calling in 2023

Ask an MSP Expert: Mastering cold-calling in 2023

As a managed service provider (MSP), you are constantly looking for ways to grow your business. Many are using cold-calling, a standard sales outreach technique, to mine for more business.  However, it’s no secret that many grapple with the perceived...

/ September 27, 2023
10 Hunter Sales Skills for MSPs
Ten essential sales hunting skills for MSPs

Ten essential sales hunting skills for MSPs

Sales hunting is a critical role for managed service providers (MSPs). The first sales role most MSPs hire is an appointment setter or an outside salesperson whose primary responsibility will be prospecting for new clients. Before you hire, it’s important...

/ August 10, 2023
Understanding the 2023 sales landscape to achieve optimal success
Understanding the 2023 sales landscape to achieve optimal success

Understanding the 2023 sales landscape to achieve optimal success

In this 2023 sales landscape, your sales pipeline needs to grow. The sales cycle extends more than it has in the past two years. Prospects are disappearing. You’re tracking behind on critical metrics. Now you’re trying to figure out how...

/ July 24, 2023
Read more Sales & Marketing posts »

Security

SMBs must prioritize cybersecurity planning

SMBs must prioritize cybersecurity planning

Cybersecurity vulnerabilities connected to large businesses have received much attention recently, especially the several casinos in Las Vegas that were forced to go offline due to cyberattacks. Casinos are a vital economic engine in Nevada, but it’s not just sprawling...

/ September 27, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apple releases patches for zero-day vulnerabilities

Cybersecurity Threat Advisory: Apple releases patches for zero-day vulnerabilities

Apple has released more security patches after three zero-day vulnerabilities were discovered in iOS, iPadOS, MacOS, WatchOS, and Safari. These vulnerabilities are actively being exploited in the wild against several frameworks and systems of Apple products, making sixteen total zero-days...

/ September 26, 2023
Current IT monitoring approaches lead to MSP opportunity

Current IT monitoring approaches lead to MSP opportunity

As environments become more complex, the level of satisfaction with existing approaches to IT monitoring is declining. A survey of 500 IT leaders conducted by Method Research on behalf of LogicMonitor finds nearly half of respondents (46 percent) have negative...

/ September 25, 2023
Read more Security posts »

Better Business

Empathy: The key to unlocking successful customer partnerships

Empathy: The key to unlocking successful customer partnerships

Business partnerships can be structured around several factors—shared opportunities, complementary technologies or customer bases, long-standing personal relationships, or even the sharing of mutual competitors. Trust is critical, of course, but there is another element that is also important when it...

/ September 26, 2023 / 3 Comments
What happened to the disruptive start-ups?

What happened to the disruptive start-ups?

As we go through the different generations of technology, various bandwagons have come and gone. Companies starting up with ‘e’ added at the beginning of their name and ‘.com’ added at the end, to name a few, are hard to...

/ August 16, 2023
PricewaterhouseCoopers International Limited (PwC)
PwC report highlights the need for managed services to evolve rapidly

PwC report highlights the need for managed services to evolve rapidly

PricewaterhouseCoopers International Limited (PwC) has published a report based on a survey of more than 2,000 business leaders that finds the top 20 percent of high-performing organizations in terms of profit margin, and revenue growth are 4.2 times more likely...

/ August 1, 2023
Read more Better Business posts »

Tech Insight

Tech Time Warp
Tech Time Warp: History of the first case of ransomware

Tech Time Warp: History of the first case of ransomware

In this week’s Tech Time Warp, we look at the recent cybersecurity news out of Las Vegas sounds like something from Ocean’s 11, no matter whether your taste runs to Frank Sinatra or George Clooney: two of the world’s largest...

/ September 22, 2023
Tech Time Warp
Tech Time Warp: Nimda worm slows traffic with multiple propagation methods

Tech Time Warp: Nimda worm slows traffic with multiple propagation methods

In this week’s Tech Time Warp, we look back to September 2001. While the world was reeling from the 9/11 terrorist attacks, hackers unleashed a new threat: a worm that could modify existing websites to trick users into downloading malware....

/ September 15, 2023
Pioneers in Tech
Pioneers in Tech: Happy birthday to AI pioneer John McCarthy

Pioneers in Tech: Happy birthday to AI pioneer John McCarthy

This week’s Pioneers in Tech takes a look at John McCarthy, the technology pioneer who coined the term “AI” back in 1955. Born Sept. 4, 1927, McCarthy first used “AI” in his proposal for the 1956 Dartmouth Conference, a gathering...

/ September 8, 2023
Read more Tech Insight posts »