Category: Featured
Threat Spotlight: Tycoon 2FA phishing kit updated to evade inspection
This Threat Spotlight sheds light on the Tycoon multi-factor authentication phishing kit and the tactics it uses to evade protection solutions. Phishing-as-a-Service (PhaaS) provides attackers with advanced toolsets and templates that enable them to quickly deploy phishing campaigns. The rapid...
AI adoption: Challenges and opportunities for MSPs
An expected boon to IT spending driven by investments in artificial intelligence (AI) may take longer to materialize than expected. A UBS survey of over 120 IT executives found that only 11 percent are running an AI application in a...
2025 trends for MSP marketing
It’s that time of year again—the time when we set goals and look forward to what the new year may bring. I’ve been in the managed service provider (MSP) marketing space for a very long time – and I can...
Unlocking a new opportunity: Selling cybersecurity to schools for MSPs
Managed service providers (MSPs) often overlook schools and other educational institutions, even though they present an excellent opportunity for new business. That is, if one is ready to handle some of their inherent challenges. According to various market research reports,...
Tip Tuesday: Differentiate your service offerings with customization
As the managed services industry becomes more crowded, succeeding as a managed service provider (MSP) requires you to differentiate your service offerings, and to convince your current and potential clients that your company and services will allow them to accomplish...
Cybersecurity Threat Advisory: Vulnerability in Ivanti secure access solutions
A critical security flaw in Ivanti, CVE-2025-0283, is affecting Ivanti Connect Secure, Policy Secure, and ZTA Gateways. This stack-based buffer overflow vulnerability allows a locally authenticated attacker to escalate their privileges. Continue reading this Cybersecurity Threat Advisory to mitigate your...
Tech Time Warp: The public learns about the SAGE air defense system
Do you know those massive computers in old movies? The ones with rows of blinking lights and lots of buttons, as featured in Dr. Strangelove and so many other films? Those weren’t the product of a Hollywood imagination—they were based...
Automated incident response – efficiency at scale
No matter how robust your email security measures are, some threats will inevitably bypass initial defenses. Whether it’s a sophisticated phishing attack or an emerging malware variant, the ability to swiftly detect and respond to post-delivery threats is critical for...
Major 2025 spike in cloud spending bodes well for MSPs
Gartner is forecasting a 21.5 percent increase in spending on public cloud services in 2025. This increase is forecasted based on the investments in artificial intelligence (AI). The market research firm expects cloud spending to reach $723.4 billion, up from $595.7...