Month: September 2024
Spotlight on how MSPs can influence organizations’ profitability
A recent PwC report shows that organizations with strategic relationships with managed service providers (MSPs) are far more profitable than those that simply employ them to reduce costs or plug capabilities gaps. According to a survey of 2,000 business leaders,...
Tech Time Warp: The logic bomb that launched an industry
Whether you called it Jerusalem, Friday the 13th, Datacrime, or the Columbus Day virus, the malware was first uncovered in October 1987 and the variants it inspired are remembered nearly 50 years later for the good they did. No—really, you...
MSP at the forefront against credential stuffing
Credential stuffing has been around for a while, and it is exactly what it sounds like: an attack in which hackers use a cache of compromised usernames and passwords to break into a system. However, hackers have recently found new...
AI drives profit and revenue for MSPs and consultants
Recent studies by Canalys and Channel Futures project managed service provider (MSP) revenue to grow 11% or more in 2024. The Channel Futures study reveals that 62% of MSPs increased their artificial intelligence (AI) deployments and consultations in the fourth quarter...
Accelerating cybersecurity Time to Resolution (TTR)
When it comes to cyberattacks and data breaches, time to respond (TTR) is a critical metric for managed service providers (MSPs), but one that can be challenging as the frequency and sophistication of threats continue to evolve. MSPs typically have...
What do the “perfect” CTAs look like on an MSP website?
Call-to-actions (CTAs) are what everything on your managed service provider (MSP) website leads to. In most cases, a CTA involves a website visitor entering their information (name, email, phone number, etc.) for something in return, such as a consultation, meeting,...
MSPs to chart a course for GenAI complexities
Organizations that are at the forefront of adopting generative artificial intelligence (GenAI) are running into a plethora of issues. A survey of 1,500 AI practitioners and decision-makers conducted by S&P Global Market Intelligence on behalf of WEKA finds that, on average,...
Tech Time Warp: The impetus for U.S. national security policy was… a teen movie?
“Is this a game, or is it real?” Eighties movie buffs will recognize this famous line from 1983’s WarGames, where Matthew Broderick plays a teenager who hacks into a defense department computer system. After Broderick’s character guesses an insecure password...
Cybersecurity Threat Advisory: Critical GitLab SAML vulnerability
A vulnerability identified as CVE-2024-45409 has been found in GitLab’s Ruby-SAML library. This flaw stems from the improper validation of Security Assertion Markup Language (SAML) responses. Continue reading this Cybersecurity Threat Advisory to secure your environment. What is the threat?...
The power of hosted remote desktops for MSPs
In my last piece, I discussed how using hosted remote desktops can minimize risks should a major incident occur. Beyond reducing risks, the use of remote desktops provides a lot more than just basic access capabilities. Reduce helpdesk calls and...