Category: Featured
Tech Time Warp: From Odeo to Twttr to Twitter
As you ponder whether you’re willing pay $8 to $20 a month for a blue checkmark, it’s worth taking a minute to learn about the history of Twitter. The social network’s debut at SXSW 2007 is well known, but its...
The value of holiday shopping user training
Once the calendar turns to November, people begin eyeing the dwindling days until Christmas. And with that sandglass motion of the calendar comes shopping, much of it being online. Studies about shopping, work, and cybersecurity risks are not plentiful, but...
6 Cybersecurity conversation starters
For MSPs and VARs trying to expand the reach of their services with existing clients, initiating a cybersecurity conversation around the need for solutions and services can be challenging. This is often because clients believe that their cybersecurity needs are...
Cybersecurity Threat Advisory: ConnectWise critical security release
A critical vulnerability was discovered within the ConnectWise Recover and R1Soft Server Backup Manager. The vulnerability is described by ConnectWise as “improper neutralization of special elements in output used by a downstream component”. Successful exploitation of the vulnerability would allow...
Tech Time Warp: The biggest lesson from the Equifax data breach
As Cybersecurity Awareness Month winds down, it’s time to take a look at the final component of this year’s “See Yourself in Cyber” campaign: software updates. This year’s theme emphasizes the role of personal responsibility in protecting yourself online. Responding...
The Rise of WebAssembly
A portable binary instruction format known as WebAssembly (Wasm) for building software that runs in a memory-safe, sandboxed execution environment is about to transform how modern applications are constructed.
Understanding your sales funnel leads to better sales productivity – Part 1
Since the sales funnel is a visual representation of your sales process, you can learn a lot by looking at its shape. A good sales funnel should be wide at the top, where new leads enter and start their journeys...
New report validates need for a centralized approach to education cybersecurity
The U.S. Government Accountability Office (U.S. GAO) has released a report showing that schools remain vulnerable to cyberattacks. “Kindergarten through grade 12 (K-12) schools have reported significant educational impact due to cybersecurity incidents, such as ransomware attacks. Cyberattacks can also...
It’s time to rethink your marketing strategy MSPs
In a recent article, MSP lead generation failures, I talked about some of the common challenges I hear from MSPs. They want “more blogs”, “more advertising budget”, and “more more more” of things that haven’t worked well in the past,...
