Category: Featured

Tech Time Warp: Did you forget about the first iPhone?

Tech Time Warp: Did you forget about the first iPhone?

As ubiquitous as the iPhone is today (and as many competitors as it has inspired), it can be difficult to think back to June 2007, when the first iPhone went on sale. Disrupting the Blackberry world, the iPhone of 2007 was...

/ June 24, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Black Basta Ransomware Group threat

Cybersecurity Threat Advisory: Black Basta Ransomware Group threat

The Black Basta ransomware group is revamping an older malware known as Qbot, Qakbot and Plinkslipbot to exploit the Microsoft Exchange Server. A successful attack will allow threat actors the ability to gain target network access, collect critical personal information,...

/ June 24, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: A Microsoft Azure Synapse vulnerability uncovered

Cybersecurity Threat Advisory: A Microsoft Azure Synapse vulnerability uncovered

Security researchers at Orca uncovered a vulnerability in Microsoft Azure Synapse, dubbed SynLapse. This vulnerability lies in the ODBC or Online Database Connectivity method employed by Synapse. Once a bad actor gains access through this vulnerability, they can gain access...

/ June 22, 2022
Breaking it down: The Evolving Landscape of the MSP Business Report 2022

Breaking it down: The Evolving Landscape of the MSP Business Report 2022

The fifth annual Evolving Landscape of the MSP Business Report demonstrated to us all that there is still a huge appetite for managed services, with global services-related MSP revenue set to increase by a further ten percent in 2022 compared...

/ June 21, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft 365 functionality vulnerability

Cybersecurity Threat Advisory: Microsoft 365 functionality vulnerability

Security researchers recently found an existing file version control functionality in Microsoft 365 and Office 365 enables threat actors to encrypt files stored with ransomware. The process used to encrypt these files can make them unrecoverable when proper backup is not...

/ June 17, 2022
Tech Time Warp: The Early Days of IBM

Tech Time Warp: The Early Days of IBM

The monolith we know today as IBM got its start June 16, 1911, when the forward-thinking Charles R. Flint merged the International Time Recording Company, Computing Scale Company and the Tabulating Machine Company—all “computing and tabulating enterprises”—into the Computing-Tabulating-Recording Company,...

/ June 17, 2022
Making sure your vendors are secure

Making sure your vendors are secure

We’ve all heard about major breaches and the cascading impact they can have across a variety of services. As an MSP, these upstream breaches are clearly out of your control, but you can and should be questioning whether the services...

/ June 15, 2022
Pioneers in Tech: Lynn Conway’s story

Pioneers in Tech: Lynn Conway’s story

For this week’s Pioneers in Tech, Lynn Conway is in the spotlight. Lynn, a 2014 Computer History Museum fellow, belongs on any list of technology pioneers for her work alone. Working at Xerox PARC, she invented scalable design rules for VLSI...

/ June 10, 2022
Blast off with FestivITies 2022: Galactic giveaways!

Blast off with FestivITies 2022: Galactic giveaways!

We at Barracuda MSP know the important role an MSP plays in the cybersecurity ecosystem. We think MSPs are out of this world. To thank and celebrate MSPs, Barracuda MSP has joined forces with Auvik and 6 other MSP vendors,...

/ June 9, 2022
Zero-trust IT creates major opportunity for MSPs

Zero-trust IT creates major opportunity for MSPs

Interest levels in approaches to creating zero-trust IT environments are now reaching a zenith. A survey of 800 IT and security professionals, conducted by The Cloud Security Alliance (CSA), finds 94 percent of respondents are in the process of implementing...

/ June 8, 2022