Increased open source software reliance creates MSP opportunities
A survey of 712 IT professionals suggests that as organizations rely more on open source software, they are struggling with security updates and patches (39 percent), installations, upgrades, and configurations (30 percent), and technical support (29 percent). Nearly half (47...
What does a “right-size” incident response plan look like?
Often, when a cyber incident occurs, the response is ad hoc—a reactive, seat‑of‑the‑pants scramble. After all, every incident is different, so how can you plan for what you don’t know? But just as every building fire is different, there are...
Tip Tuesday: Adding recurring employee qualification tracking to your services
The managed service provider (MSP) landscape is moving toward proactive compliance and employee qualification management. As MSPs, you should add recurring employee qualification tracking to your service offerings to increase revenue and improve your clients’ overall satisfaction. The value of...
Sales & Marketing
How sales assessments help MSPs avoid costly hiring mistakes
Resumes and interviews rarely tell the full story. Candidates can present themselves well, but that does not mean they can prospect, reach decision-makers, or sell value. Too often that gap shows up in MSP environments after you’ve gone through the...
Does LinkedIn still work to generate leads for MSPs? Or is it just spam?
Back in 2017, LinkedIn felt like a hidden playground for marketers. Few MSPs used it to generate leads, and even fewer did it well. I had this vision: I was going to become the person who helped MSPs get leads...
How MSPs can use marketing automation to achieve sales goals faster
Key Takeaways Marketing automation eliminates inconsistent follow-up that slows revenue. CRMs, like HubSpot, tie marketing engagement directly to sales execution. Lead scoring helps sales teams focus on real buying signals. Workflow triggers prevent pipeline gaps before they impact results. AI...
Security
Cybersecurity Threat Advisory: Active exploitation of LiteLLM vulnerability
Security researchers have confirmed active exploitation of a critical SQL injection vulnerability in the LiteLLM proxy. This is an open‑source AI gateway widely used to centralize and manage API access to large language model (LLM) providers such as OpenAI, Anthropic,...
Cybersecurity Threat Advisory: Critical GitHub vulnerability
Researchers have recently disclosed details of a critical vulnerability affecting GitHub and GitHub Enterprise Server that could allow authenticated users to achieve remote code execution using a single git push command. The flaw has raised concerns about the security of millions...
Cyber insurance is changing the rules and MSPs must adapt
For years, cyber insurance was sold to small and mid-sized businesses as a backstop that would take the sting out of a hack. In the beginning, that is what happened. But the landscape is changing fast. More than 40 percent...
Better Business
Understanding ego states to build stronger buyer relationships
Back in the late 1950s, Eric Berne introduced a model that suggests each of us operates from three ego states: Parent, Adult, and Child (PAC). These ego states surface in different situations and are influenced by how others present their...
New billings for managed enterprise services increase despite challenges
Demand for managed services appears to be on the upswing once again, though signs are emerging that certain segments are coming under sustained pressure. A quarterly Information Services Group (ISG) Index tracking new bookings exceeding $5 million in value shows...
Beyond recovery: The new resilience mindset
A global survey of 1,000 business and IT decision‑makers and senior developers shows that while organizations feel more resilient than they were a year ago, many still struggle with the cost of recovery and remediation when a real IT incident...
Tech Insight
Tech Time Warp: First prosecution under the Computer Fraud and Abuse Act
Does the punishment fit the crime? Let’s dive into this week’s Tech Time Warp to find out. Insiders from the nascent cybersecurity industry debated this question after the May 4, 1990, sentencing of Robert Tappan Morris, the first individual prosecuted...
Worldwide IT services spending to increase in 2026
The market research firm Gartner is forecasting that global IT services revenue will increase 9 percent in 2026, reaching $1.87 trillion, up from $1.71 trillion in 2025. Overall, Gartner predicts worldwide IT spending will climb to $6.31 trillion in 2026—an...
Tech Time Warp: Apple II Forever launches a tech mainstay—the Apple Event
The simply named “Apple Events” are a cultural touchpoint, instantly recognizable to even Android users. These product launches have taken on an identity of their own, a legacy worth revisiting in this Tech Time Warp. They even catapulted the black...
