Category: Featured

Hackers prey on holiday MFA fatigue

Hackers prey on holiday MFA fatigue

Multifactor authentication (MFA) is the gold standard in offices around the world. We all know the drill: you use your username (often, and inadvisably, your email address) and, perhaps, as the password, the name of your first dog and the...

/ November 8, 2022 / 5 Comments
Cybersecurity skills gap continues to widen even as ranks swell

Cybersecurity skills gap continues to widen even as ranks swell

The (ISC)2 association of cybersecurity professionals estimates there are now 4.7 million cybersecurity professionals being employed around the world, making for an 11.1 percent increase year-over-year for a total of more than 464,000 additional jobs. At the same time, (ISC)2...

/ November 7, 2022
Tech Time Warp: From Odeo to Twttr to Twitter

Tech Time Warp: From Odeo to Twttr to Twitter

As you ponder whether you’re willing pay $8 to $20 a month for a blue checkmark, it’s worth taking a minute to learn about the history of Twitter. The social network’s debut at SXSW 2007 is well known, but its...

/ November 4, 2022
The value of holiday shopping user training

The value of holiday shopping user training

Once the calendar turns to November, people begin eyeing the dwindling days until Christmas. And with that sandglass motion of the calendar comes shopping, much of it being online. Studies about shopping, work, and cybersecurity risks are not plentiful, but...

/ November 3, 2022
Barracuda XDR Insight: Threat severity rises during vacation months

Barracuda XDR Insight: Threat severity rises during vacation months

1-in-5 cyberthreats detected between June and the end of September 2022 were higher risk, compared to just 1-in-80 in January. XDR data shows that between June and September, the top threats were successful Microsoft 365 logins from a suspicious country...

/ November 2, 2022 / 6 Comments
6 Cybersecurity conversation starters

6 Cybersecurity conversation starters

For MSPs and VARs trying to expand the reach of their services with existing clients, initiating a cybersecurity conversation around the need for solutions and services can be challenging. This is often because clients believe that their cybersecurity needs are...

/ November 1, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ConnectWise critical security release

Cybersecurity Threat Advisory: ConnectWise critical security release

A critical vulnerability was discovered within the ConnectWise Recover and R1Soft Server Backup Manager. The vulnerability is described by ConnectWise as “improper neutralization of special elements in output used by a downstream component”. Successful exploitation of the vulnerability would allow...

/ October 31, 2022
Tech Time Warp: The biggest lesson from the Equifax data breach

Tech Time Warp: The biggest lesson from the Equifax data breach

As Cybersecurity Awareness Month winds down, it’s time to take a look at the final component of this year’s “See Yourself in Cyber” campaign: software updates. This year’s theme emphasizes the role of personal responsibility in protecting yourself online. Responding...

/ October 28, 2022
The Rise of WebAssembly

The Rise of WebAssembly

A portable binary instruction format known as WebAssembly (Wasm) for building software that runs in a memory-safe, sandboxed execution environment is about to transform how modern applications are constructed.

/ October 27, 2022
Understanding your sales funnel leads to better sales productivity – Part 1

Understanding your sales funnel leads to better sales productivity – Part 1

Since the sales funnel is a visual representation of your sales process, you can learn a lot by looking at its shape. A good sales funnel should be wide at the top, where new leads enter and start their journeys...

/ October 26, 2022