Month: August 2019

Highlights from ChannelCon 2019

Highlights from ChannelCon 2019

Barracuda MSP was in full force at CompTIA’s ChannelCon 2019. Not only did we have a large team, comprised of diverse backgrounds from marketing and channel development to product management, but we also participated in various different aspects of the...

/ August 15, 2019
Supply chain attacks on the rise

Supply chain attacks on the rise

You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

/ August 14, 2019
Survey shines light on chronic need for actionable cybersecurity intelligence

Survey shines light on chronic need for actionable cybersecurity intelligence

A survey of 577 IT and IT security practitioners in the U.S. conducted by The Ponemon Institute on behalf of AttackIQ, a provider of security testing tools, suggests there’s a major opportunity for managed service providers (MSPs) to provide security...

/ August 13, 2019
Ask an MSP Expert: Should my MSP have its own company vehicles?

Ask an MSP Expert: Should my MSP have its own company vehicles?

Q: I’m an MSP owner and business is booming. In fact, I’m planning on hiring two technicians to assist me in servicing customers. Should I have them take their own cars on service calls or should I purchase company vehicles?...

/ August 12, 2019
To grow your MSP business, you need to lead by example

To grow your MSP business, you need to lead by example

As the owner of a managed service business, do you understand the importance of leading by example? In an previous article, I wrote about why your MSP should eat its own dog food. Of course, this doesn’t mean you should...

/ August 12, 2019
Your next hack could arrive by snail mail

Your next hack could arrive by snail mail

When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

/ August 9, 2019 / 1 Comment
Tech Time Warp: Was the Welchia Worm well-intended?

Tech Time Warp: Was the Welchia Worm well-intended?

As the old saying goes, two wrongs don’t make a right — especially if the second “wrong” is a computer worm, albeit a benevolent one. In August 2003, hundreds of thousands of PCs were infected by the Blaster worm, which...

/ August 9, 2019 / 1 Comment
Software licensing chaos creates unique opportunity for MSPs

Software licensing chaos creates unique opportunity for MSPs

It’s no secret that software licensing models across the IT industry are chaotic. Software providers typically offer a mix of licensing options, spanning everything from subscriptions and usage-based licensing models, to traditional perpetual licenses that enable organizations to continue to...

/ August 8, 2019
Increased connectivity leads to increased security needs

Increased connectivity leads to increased security needs

When it comes to IoT, there’s no limit to the thoughts from experts and security professionals about strategies for adapting to the rapidly changing connectivity landscape in the average office. This landscape is changing daily. One statement we can make with...

/ August 7, 2019
Fallout from high profile breaches will have major impact on IT service providers

Fallout from high profile breaches will have major impact on IT service providers

A recent series of high-profile data breaches is likely to have a profound impact on IT service providers for years to come.

/ August 6, 2019