Category: Featured
Business leaders gain cybersecurity perspective
Convincing business executives even in the best of times that they need to invest more in cybersecurity has always been challenging. A survey of 722 C-level executives conducted by PwC, however, suggests the times are finally changing.
Tech Time Warp: Long Before FTX, There Was DigiCash
The headlines about the FTX cryptocurrency scandal likely either having you scratching your head or ruing your investment decisions. But FTX is hardly the first such company to declare bankruptcy. One of the first electronic currency platforms, DigiCash, lasted for...
Is your website optimized, MSPs?
As an MSP, your website is your primary marketing tool, and it is important to capitalize on Search Engine Optimization (SEO) to maximize the effectiveness of this primary marketing tool. According to Raj Khera, a three-time CEO, author, and SEO...
SEC proposing new cybersecurity disclosures
MSPs will soon likely be called upon to help clients with another cybersecurity issue, but this one isn’t about patching or installing firewalls, it’s about explaining. The U.S. Securities and Exchange Commission (SEC) proposes overhauling requirements for cybersecurity disclosures by...
MSPs can reduce costs with site reliability engineers
As the global economy becomes more challenging to navigate, the need for managed service providers (MSPs) to automate more processes becomes even more pronounced. The cost of labor is still the single biggest IT cost, so there is always a...
Pioneers in Tech: George Boole, Mathematician AND Innovator
You’ve heard of Boolean algebra and Boolean logic, and you know the Boolean system forms the basis for the modern digital computer. But you probably don’t know much about George Boole, the man himself, described as “one of the great...
Cybersecurity Threat Advisory: New VMware patches available
This week, VMware released three security patches for a critical authorization bypass vulnerability in the Workspace ONE Assist solution. The vulnerability could potentially allow remote attackers to bypass authentication and elevate their privileges within the system. The vulnerabilities are tracked as...
