Month: April 2025

Cybersecurity Threat Advisory: Craft CMS exploited
Threat actors have been actively exploiting two Craft CMS vulnerabilities, CVE-2025-32432 and CVE-2024-58136, to breach web servers and gain unauthorized access. Review the details in this Cybersecurity Threat Advisory to safeguard your devices. What is the threat? Threat actors are...

Security audits play a vital role in defense
Security audits are a crucial component of an organization’s cybersecurity strategy. However, despite their importance, they are not as commonly conducted as you might think. Shift from a reactive to a proactive mindset According to a study, only 52 percent...

Cybersecurity Threat Advisory: ScreenConnect vulnerability
Researchers have discovered a vulnerability in the ScreenConnect remote support software that upon a successful exploitation, can allow for remote execution on a targeted server. Continue reading this Cybersecurity Threat Advisory to learn how to keep your environment safe. What...

Tech Time Warp: Beware of the nefarious floppy disk
Modern computer users are becoming increasingly aware of the potential cybersecurity risks associated with USB drives. (Whatever you do, don’t get curious about a USB drive you find on the ground!) In this edition of Tech Time Warp learn about how similar...

The future of MSP marketing: How AI enhances, not replaces, creativity in MSP marketing
Artificial intelligence (AI) is reshaping industries, and managed service provider (MSP) marketing is no exception. As AI-driven tools become increasingly advanced, many marketers wonder how this technology will impact human creativity. The reality? AI isn’t here to replace marketers, especially...

Maximizing value: MSPs focus on IT cost optimization
In the coming weeks, IT organizations will be turning to managed service providers (MSPs) to help them optimize their existing investments during this period of uncertainty. Historically, when faced with economic challenges, IT organizations have focused on two key areas:...

SOC 2 made easy: A step-by-step guide for MSPs
As more businesses adopt cloud services and prioritize data security, SOC 2 compliance has become a rapidly growing baseline requirement for conducting business, particularly in industries such as technology, finance, and healthcare. Managed service providers (MSPs) are increasingly being asked...

Cybersecurity Threat Advisory: Critical SSL.com vulnerability
A significant flaw has been identified in SSL.com’s Domain Control Validation (DCV) process, which poses a risk of issuing unauthorized SSL/TLS certificates. This vulnerability could expose trusted domains to impersonation, man-in-the-middle (MITM) attacks, and the interception of encrypted traffic. We recommend...

Cybersecurity 2025 trends: Key emerging threats
Welcome to part two of our deep dive into 2025’s cybersecurity landscape. As highlighted in part one of this blog, generative artificial intelligence (GenAI) and supply chain vulnerabilities are at the forefront of cyberthreats. We consulted with other industry experts...