Category: Featured
Hackers prey on holiday MFA fatigue
Multifactor authentication (MFA) is the gold standard in offices around the world. We all know the drill: you use your username (often, and inadvisably, your email address) and, perhaps, as the password, the name of your first dog and the...
Cybersecurity skills gap continues to widen even as ranks swell
The (ISC)2 association of cybersecurity professionals estimates there are now 4.7 million cybersecurity professionals being employed around the world, making for an 11.1 percent increase year-over-year for a total of more than 464,000 additional jobs. At the same time, (ISC)2...
Tech Time Warp: From Odeo to Twttr to Twitter
As you ponder whether you’re willing pay $8 to $20 a month for a blue checkmark, it’s worth taking a minute to learn about the history of Twitter. The social network’s debut at SXSW 2007 is well known, but its...
The value of holiday shopping user training
Once the calendar turns to November, people begin eyeing the dwindling days until Christmas. And with that sandglass motion of the calendar comes shopping, much of it being online. Studies about shopping, work, and cybersecurity risks are not plentiful, but...
6 Cybersecurity conversation starters
For MSPs and VARs trying to expand the reach of their services with existing clients, initiating a cybersecurity conversation around the need for solutions and services can be challenging. This is often because clients believe that their cybersecurity needs are...
Cybersecurity Threat Advisory: ConnectWise critical security release
A critical vulnerability was discovered within the ConnectWise Recover and R1Soft Server Backup Manager. The vulnerability is described by ConnectWise as “improper neutralization of special elements in output used by a downstream component”. Successful exploitation of the vulnerability would allow...
Tech Time Warp: The biggest lesson from the Equifax data breach
As Cybersecurity Awareness Month winds down, it’s time to take a look at the final component of this year’s “See Yourself in Cyber” campaign: software updates. This year’s theme emphasizes the role of personal responsibility in protecting yourself online. Responding...
The Rise of WebAssembly
A portable binary instruction format known as WebAssembly (Wasm) for building software that runs in a memory-safe, sandboxed execution environment is about to transform how modern applications are constructed.
Understanding your sales funnel leads to better sales productivity – Part 1
Since the sales funnel is a visual representation of your sales process, you can learn a lot by looking at its shape. A good sales funnel should be wide at the top, where new leads enter and start their journeys...
