Category: Featured

Cold calling on its own does not work for MSPs
Now I know what you might be thinking, you just read that “cold calling doesn’t work for managed services providers (MSPs)”, but you have personally seen it produce results for your managed services business, or for your clients. Yes, I...

Tech Time Warp: The first computer election prediction
In a year when we’ve all become amateur epidemiologists, this week we’ve also received a crash course in ballot counting and election predictions. So it’s only fitting to look back at Nov. 4, 1952, a night of multiple presidential election...

Ask an MSP Expert: MSPs and November elections
No matter what happens on Election Day in the USA, it will ripple through the MSP ecosystem. All significant events tend to bring out the cybercriminals, and 2020 has been a bonanza for the bad guys. According to a Forbes...

Tech Time Warp: The father of RFID technology
As National Cybersecurity Awareness Month wraps up, it’s important to remember that cybersecurity goes beyond your laptop and your smartphone. Even as mundane an object as your office security fob is potentially vulnerable to a cyberattack—likely not something contemplated in...

What your automated marketing funnel needs to generate leads
A common challenge for MSPs is lead generation. How do you find new prospects who are ready to talk about your services? It takes time, money, and often, significant trial and error. Most MSPs rely heavily or entirely on word-of-mouth....

Survey identifies WAN’s biggest pain points
A survey of 414 IT professionals published this week by Telia Carrier by Savanta finds security is a top pain point when it comes to wide area networks (WANs). 55 percent listed this as their main concern, followed by service flexibility (43...

Composite applications and microservices vs. hosted applications
There is a move in the MSP space to replace monolithic hosted applications with more dynamic composite applications built from a collection of microservices. While this approach provides a number of positive outcomes, it also comes with its challenges. Let’s...

Email threat types: Domain Impersonation
Domain impersonation, also known as typosquatting, is often used as part of a conversation hijacking attempt. Attackers target legitimate domains, such as Barracudamsp.com, by creating domains that appear similar. Such a domain might be accessed by a user typing the...

Tech Time Warp: Credit card companies put PCI compliance in place
We were headed toward a nearly cashless society anyway, but the COVID-19 pandemic and the rise of “contactless” transactions is likely the final push over the edge. Every time you place a takeout order via a mobile app, you’re putting...