Month: February 2020
Tech Time Warp: The Leap Year Bug, Y2K’s lesser known counterpart
As we like to chuckle about now, Y2K ended up being a bit of a yawn. But do you recall the year 2000’s other calendar-based tech issue, the Leap Year Bug? Ultimately, it didn’t result in any major catastrophes either,...
Coronavirus helps spread computer viruses
Coronavirus has sent a chill through the world economy and has spread fear beyond its origin in the Wuhan province of China. As the virus threatens to become a global pandemic, hackers and cybercriminals are using public apprehension over the...
The cloud opportunity for MSPs extends well into on-premises IT environments
There’s no doubt that the rate application workloads are moving into the public clouds is starting to accelerate. However, it is less clear what the biggest opportunities are for managed service providers (MSPs). There is money to be made by...
MSP Metric: Customer lifetime value (LTV)
As providers of various SaaS products, MSPs sometimes feel “stuck in the middle,” providing the sales and front-line support for such products in exchange for a considerably small margin. We rely heavily on these products and I have always wondered...
Add to your skill set with free Salesforce training
Recently, we looked at how you could take advantage of free or low-cost resources to learn how to code. Now, we’re going to look at free training offered by Salesforce, a popular set of sales, marketing, and customer service tools....
Sales tactics to generate more MRR in 2020
Many IT providers struggle with establishing steady flows of monthly recurring revenue (MRR). Often, the reason this happens is that MSPs fail to follow a disciplined sales process designed to ensure their business is sales-focused, instead of sales-interested. There are...
Cybersecurity Threat Advisory: CDPwn Vulnerabilities Impact Cisco Devices
Advisory Overview Five vulnerabilities were discovered in Cisco devices, exploiting the Cisco Discovery Protocol. The vulnerabilities are grouped under the name CDPwn and were reported by the cybersecurity firm Armis. Using this exploit, hackers could take control over Cisco routers,...
Tech Time Warp: Mocmex sneaks in via digital photo frame
“Beware of Greeks bearing gifts” is the old saying associated with the story of the Trojan horse — the same story that gives Trojan viruses their name. In 2008, a more appropriate saying would have been “beware of relatives bearing...
AI-based security helps MSP alleviate email security pain
Based in Powell, Ohio, TTG is a seasoned voice, data, and mobile managed services provider, dedicated to improving the ecosystem of its customers’ communication, data, and network security infrastructure. The company’s telecom experts provide infrastructure connectivity, planning, installation, and maintenance...
Survey identifies data protection as top service being delivered by third-parties
A survey of 110 IT decision-makers based in the U.S. suggests that the reliance on third-party IT services is starting to increase as IT becomes more complex. Conducted by US Signal, a provider of data center services, the survey finds...