Category: Featured
The cyber-physical attack threat is growing
In most cases, a breach involves hackers stealing data they can then resell on the dark web. As a result, distributed denial-of-service (DDoS) attacks and other attacks used to steal data are part of a hacker’s repertoire that managed service...
Copywriting 101: How MSPs can achieve A-level website copy
Copywriting tends to be an underappreciated art in web design and marketing. Words can look boring next to fancy designs and animations. But here’s the thing about copywriting on managed service provider (MSP) websites: a poorly designed website can still...
Cybersecurity Threat Advisory: Critical SonicOS vulnerability
A critical vulnerability has been identified in the SonicWall SonicOS management access. Continue reading this Cybersecurity Threat Advisory to learn about this vulnerability and recommendations to secure your environment. What is the threat? CVE-2024-40766, a critical vulnerability in the management...
MSP expertise needed to enhance cloud services experience
A survey of more than 500 IT professionals, conducted by Civo, a provider of cloud computing services, suggests that well over a third of organizations need some help managing their cloud computing environments. Rising cloud costs are often being ignored...
Tech Time Warp: Have you ever wondered about the history of cut, copy, and paste?
For many of us, using the keyboard shortcuts for cut, copy, and paste is as second nature as flipping a light switch. Whether you’re a Mac (Command-) or a PC (Ctrl+) user, these shortcuts make life easier and word processing...
MSP tips to properly dispose e-waste
Managed service providers (MSPs) have a lot to do when it comes to keeping their clients safe. For example, they must watch patches, firewalls, IoT, and even dumpsters. While it is illegal to toss electric waste (e-waste) into the dumpster...
Cybersecurity Threat Advisory: Your Oracle NetSuite data may be exposed
Researchers discovered that externally-facing Oracle NetSuite e-commerce sites may expose sensitive customer information when configured inaccurately. Review the details in this Cybersecurity Threat Advisory to learn best practices to mitigate your business risk. What is the threat? It is found...
Cybersecurity Threat Advisory: Exploited Jenkins vulnerability
The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability found in Jenkins, identified as CVE-2024-23897 with a CVSS score of 9.8, to its Known Exploited Vulnerabilities (KEV) catalogue. This vulnerability is a path traversal flaw within the...