Category: Featured

Tech Time Warp: The father of RFID technology

Tech Time Warp: The father of RFID technology

As National Cybersecurity Awareness Month wraps up, it’s important to remember that cybersecurity goes beyond your laptop and your smartphone. Even as mundane an object as your office security fob is potentially vulnerable to a cyberattack—likely not something contemplated in...

/ October 30, 2020
What your automated marketing funnel needs to generate leads

What your automated marketing funnel needs to generate leads

A common challenge for MSPs is lead generation. How do you find new prospects who are ready to talk about your services? It takes time, money, and often, significant trial and error. Most MSPs rely heavily or entirely on word-of-mouth....

/ October 29, 2020
Survey identifies WAN’s biggest pain points

Survey identifies WAN’s biggest pain points

A survey of 414 IT professionals published this week by Telia Carrier by Savanta finds security is a top pain point when it comes to wide area networks (WANs). 55 percent listed this as their main concern, followed by service flexibility (43...

/ October 28, 2020
Composite applications and microservices vs. hosted applications

Composite applications and microservices vs. hosted applications

There is a move in the MSP space to replace monolithic hosted applications with more dynamic composite applications built from a collection of microservices. While this approach provides a number of positive outcomes, it also comes with its challenges. Let’s...

/ October 27, 2020
Email threat types: Domain Impersonation

Email threat types: Domain Impersonation

Domain impersonation, also known as typosquatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate domains, such as Barracudamsp.com, by creating domains that appear similar. Such a domain might be accessed by a user typing the...

/ October 26, 2020
Tech Time Warp: Credit card companies put PCI compliance in place

Tech Time Warp: Credit card companies put PCI compliance in place

We were headed toward a nearly cashless society anyway, but the COVID-19 pandemic and the rise of “contactless” transactions is likely the final push over the edge. Every time you place a takeout order via a mobile app, you’re putting...

/ October 23, 2020
Helping your clients understand their customers better

Helping your clients understand their customers better

The pandemic has changed the way we do business. Most of your clients probably aren’t meeting customers in person, or if they are, it’s with minimal contact as possible. As this new way of conducting business takes hold, much of...

/ October 22, 2020
Survey unveils edge computing opportunity for MSPs

Survey unveils edge computing opportunity for MSPs

A global survey of 1,652 individuals from a broad set of industries and organizations published this week by Eclipse Foundation, a consortium that promotes adoption of open source tools and platforms, shows the level of diversity among edge computing platforms...

/ October 21, 2020
Perfect your LinkedIn profile, generate more leads

Perfect your LinkedIn profile, generate more leads

Previously, I wrote a piece called “Can MSPs really used LinkedIn for lead generation? Absolutely – and here’s how.” It’s something I still feel incredibly strong about, and it’s also a perspective that I think has been reinforced by everything currently...

/ October 20, 2020
MSPs and election cybersecurity

MSPs and election cybersecurity

MSPs have emerged as central players in the democracy machinery. And after a rash of recent attacks on MSPs, some worry that MSPs may face a new challenge in election cybersecurity for the United States’ upcoming Presidential elections. Tim Davis,...

/ October 19, 2020