Category: Featured

MSPs and opportunities in autonomous vehicles

MSPs and opportunities in autonomous vehicles

A new partnership announced this week between the University of Windsor’s The SHIELD Automotive Cybersecurity Centre of Excellence and South Korea’s Autocrypt will help foster the growth of autonomous vehicles and their usage in North America, including for small businesses,...

/ May 26, 2021
Carpe Diem – Seize the MSP Day

Carpe Diem – Seize the MSP Day

As we once again gear up for our annual MSP Day, I can’t help but cast my mind back to last year’s festivities. Despite the uncertainty and isolation many of us were feeling, 2020 was the year MSP Day went...

/ May 24, 2021
What your MSP business can measure, can also be managed

What your MSP business can measure, can also be managed

In my previous article, I recommended that MSPs make decisions based on clearly defined metrics, rather than just your gut feelings. In this post, I want to take a deeper dive into the value of managing your MSP business with...

/ May 24, 2021
Tech Time Warp: Looking back at the evolution of ransomware

Tech Time Warp: Looking back at the evolution of ransomware

The havoc wreaked by the recent Colonial Pipeline ransomware attack—which caused a gas shortage in the southeastern United States and cost the company a reported $850,000 to resolve—highlights the immense risk ransomware poses to companies and national security.

/ May 21, 2021
Nuanced approach to cloud service consumption is emerging

Nuanced approach to cloud service consumption is emerging

Conventional wisdom holds that, in the long-term, it’s inevitable the bulk of application workloads will be running on a cloud service, typically a shared public cloud infrastructure. However, a survey of 150 global business and IT professionals published this week...

/ May 20, 2021
Pioneers in Tech: Mary Allen Wilkes, first to WFH with a computer

Pioneers in Tech: Mary Allen Wilkes, first to WFH with a computer

Remote work has long been common in the tech industry, even pre-coronavirus, but it had to start somewhere. After all, you couldn’t exactly squeeze an ENIAC in the spare bedroom. That’s why the story of Mary Allen Wilkes remains relevant...

/ May 14, 2021
DDoS “celebrates” 25th anniversary with a spike

DDoS “celebrates” 25th anniversary with a spike

The first documented widespread distributed denial-of-service (DDoS) attack occurred in 1996 when New York City-based internet provider, Panix, was attacked. The New York Times described it: Beginning Sept. 6 and continuing through at least last Tuesday, a hacker intent on shutting...

/ May 12, 2021
How to run an effective Google Ads campaign

How to run an effective Google Ads campaign

As someone who has managed hundreds of thousands of dollars in ad spend over the course of my career, let me tell you – Google Ads are still one of the most powerful opportunities that many MSPs aren’t taking advantage...

/ May 11, 2021
Tech Time Warp: The colorful history of the iMac

Tech Time Warp: The colorful history of the iMac

In April, Apple launched preorders for a new collection of new iMacs, available in seven bright colors with accessories to match. It’s a homage to the first iMac, which Steve Jobs introduced to the world May 6, 1998. The iMac...

/ May 7, 2021
Deploying Apple devices remotely with zero touch installation

Deploying Apple devices remotely with zero touch installation

As an IT pro, bringing a level of automation to onboarding and updates with zero touch installation just makes your job easier. If a person can take an Apple device out of the box, sign in using their work credentials...

/ May 4, 2021