Category: Featured
What to do when your website content doesn’t convert leads
You’ve designed your website following SEO best principles. Web traffic is up. And yet, the phones are silent. Tumbleweeds roll through your salespeople’s inboxes. What gives? It’s simple. Your website content development strategy isn’t primed for conversion.
Hackers prey on holiday MFA fatigue
Multifactor authentication (MFA) is the gold standard in offices around the world. We all know the drill: you use your username (often, and inadvisably, your email address) and, perhaps, as the password, the name of your first dog and the...
Cybersecurity skills gap continues to widen even as ranks swell
The (ISC)2 association of cybersecurity professionals estimates there are now 4.7 million cybersecurity professionals being employed around the world, making for an 11.1 percent increase year-over-year for a total of more than 464,000 additional jobs. At the same time, (ISC)2...
Tech Time Warp: From Odeo to Twttr to Twitter
As you ponder whether you’re willing pay $8 to $20 a month for a blue checkmark, it’s worth taking a minute to learn about the history of Twitter. The social network’s debut at SXSW 2007 is well known, but its...
The value of holiday shopping user training
Once the calendar turns to November, people begin eyeing the dwindling days until Christmas. And with that sandglass motion of the calendar comes shopping, much of it being online. Studies about shopping, work, and cybersecurity risks are not plentiful, but...
6 Cybersecurity conversation starters
For MSPs and VARs trying to expand the reach of their services with existing clients, initiating a cybersecurity conversation around the need for solutions and services can be challenging. This is often because clients believe that their cybersecurity needs are...
Cybersecurity Threat Advisory: ConnectWise critical security release
A critical vulnerability was discovered within the ConnectWise Recover and R1Soft Server Backup Manager. The vulnerability is described by ConnectWise as “improper neutralization of special elements in output used by a downstream component”. Successful exploitation of the vulnerability would allow...
Tech Time Warp: The biggest lesson from the Equifax data breach
As Cybersecurity Awareness Month winds down, it’s time to take a look at the final component of this year’s “See Yourself in Cyber” campaign: software updates. This year’s theme emphasizes the role of personal responsibility in protecting yourself online. Responding...
The Rise of WebAssembly
A portable binary instruction format known as WebAssembly (Wasm) for building software that runs in a memory-safe, sandboxed execution environment is about to transform how modern applications are constructed.
