Category: Featured

cyber-physical attack
The cyber-physical attack threat is growing

The cyber-physical attack threat is growing

In most cases, a breach involves hackers stealing data they can then resell on the dark web. As a result, distributed denial-of-service (DDoS) attacks and other attacks used to steal data are part of a hacker’s repertoire that managed service...

/ August 29, 2024
copywrite
Copywriting 101: How MSPs can achieve A-level website copy

Copywriting 101: How MSPs can achieve A-level website copy

Copywriting tends to be an underappreciated art in web design and marketing. Words can look boring next to fancy designs and animations. But here’s the thing about copywriting on managed service provider (MSP) websites: a poorly designed website can still...

/ August 28, 2024
Crafting the ultimate partner program to drive partner success

Crafting the ultimate partner program to drive partner success

Albert Einstein once said, “Life is like riding a bicycle. To keep your balance, you must keep moving.” Barracuda Vice President of Worldwide Partner Ecosystems – and an avid cyclist – Jason Beal is applying that same idea to Barracuda’s...

/ August 27, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical SonicOS vulnerability

Cybersecurity Threat Advisory: Critical SonicOS vulnerability

A critical vulnerability has been identified in the SonicWall SonicOS management access. Continue reading this Cybersecurity Threat Advisory to learn about this vulnerability and recommendations to secure your environment. What is the threat? CVE-2024-40766, a critical vulnerability in the management...

/ August 27, 2024
cloud services
MSP expertise needed to enhance cloud services experience

MSP expertise needed to enhance cloud services experience

A survey of more than 500 IT professionals, conducted by Civo, a provider of cloud computing services, suggests that well over a third of organizations need some help managing their cloud computing environments. Rising cloud costs are often being ignored...

/ August 26, 2024
Tech Time Warp
Tech Time Warp: Have you ever wondered about the history of cut, copy, and paste?

Tech Time Warp: Have you ever wondered about the history of cut, copy, and paste?

For many of us, using the keyboard shortcuts for cut, copy, and paste is as second nature as flipping a light switch. Whether you’re a Mac (Command-) or a PC (Ctrl+) user, these shortcuts make life easier and word processing...

/ August 23, 2024
e-waste
MSP tips to properly dispose e-waste

MSP tips to properly dispose e-waste

Managed service providers (MSPs) have a lot to do when it comes to keeping their clients safe. For example, they must watch patches, firewalls, IoT, and even dumpsters. While it is illegal to toss electric waste (e-waste) into the dumpster...

/ August 22, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Your Oracle NetSuite data may be exposed

Cybersecurity Threat Advisory: Your Oracle NetSuite data may be exposed

Researchers discovered that externally-facing Oracle NetSuite e-commerce sites may expose sensitive customer information when configured inaccurately. Review the details in this Cybersecurity Threat Advisory to learn best practices to mitigate your business risk. What is the threat? It is found...

/ August 22, 2024
Neal Bradbury on driving innovation for the channel at Barracuda

Neal Bradbury on driving innovation for the channel at Barracuda

For our long-term subscribers and those who have been in the managed services industry for the past two decades, you may be familiar with Neal Bradbury, who co-founded Intronis, a managed service provider (MSP) focused data protection company.   Recently appointed...

/ August 22, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Exploited Jenkins vulnerability

Cybersecurity Threat Advisory: Exploited Jenkins vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability found in Jenkins, identified as CVE-2024-23897 with a CVSS score of 9.8, to its Known Exploited Vulnerabilities (KEV) catalogue. This vulnerability is a path traversal flaw within the...

/ August 21, 2024