Month: May 2019
Growth Hacking for MSPs: Resource Utilization
A trend that I’ve noticed recently in managed services is that companies are struggling to earn a consistent profit, and/or have cash flow issues, often times appear to be over-staffed on their front-line. There are times when your team is...
Ask an MSP Expert: What are some different pricing strategies to consider?
Q: There seems to be a lot of different opinions on how we should price our offering. How can we determine what the right pricing strategy is for our MSP business? Setting a pricing strategy is a critical process for...
Cybersecurity Threat Advisory: RogueRobin Advanced Malware
What is the threat? Cyber researchers have recently found that there’s a custom-developed malware known as RogueRobin which uses multiple techniques to upload and download files to/from affected host(s). It was reported that the cyber threat adversary, DarkHydrus, is responsible...
Cybersecurity Threat Advisory: Cisco Flaw Leaves Networks Wide Open
What is the threat? Security researchers identified a critical and unpatched vulnerability (CVE-2018-15439) in the widely deployed Cisco Small Business Switch Software that could allow a remote attacker to bypass security restrictions and gain full admin access. The default configuration...
Cybersecurity Threat Advisory: Global DNS Hijacking Campaign
What is the threat? Organized cyber attackers have hijacked many Domain Name Servers (DNS) and manipulated them in ways which allow them to redirect traffic to/from a victim network and harvest usernames, passwords, and domain credentials for organizations which they...
Buy or die – long term prospecting
Recently, Managed Sales Pros has closed two new clients. What’s special about these engagements? Nothing, except that we’ve been pursuing both clients for around four years. The value of those clients totaled about 42,000 in MRR. A decent win, that...
Tech Time Warp: Prince Philip’s inbox gets hacked
Harry and Meghan might grab headlines for their privacy settlements and use of social media, but the younger royals are hardly breaking new ground. You might say they’re just following in the family’s footsteps. In 1985, two hackers were arrested...
Cybersecurity Threat Advisory: Linux Systemd Exploit
What is the threat? A core component in Linux that manages system processes known as “systemd” could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems. These vulnerabilities reside in the “systemd-journald” service that...
Need for zero-trust IT environments bodes well for MSPs
As part of a concerted effort to improve their overall cybersecurity posture, most organizations are now moving towards building a true zero-trust IT environment. After years of pursuing a hodgepodge approach to IT, organizations are starting to realize that a...
Cybersecurity Threat Advisory: Zero Day in Windows Kernel Transaction Manager
What is the threat? A new, zero-day exploit was discovered targeting several victims in the Middle East and Asia. The vulnerability affects Microsoft Windows and Microsoft server. The Microsoft Windows Kernel Transaction Manager(KTM)is vulnerable to a race condition because it...