Category: Featured

Tech Time Warp
Tech Time Warp: O CHRISTMA tree, O CHRISTMA tree, your exec is not so amazing

Tech Time Warp: O CHRISTMA tree, O CHRISTMA tree, your exec is not so amazing

It’s the most wonderful time of the year! That doesn’t mean you should let your guard down when it comes to cybersecurity. That’s a lesson some computer users learned the hard way in December 1987. In this edition of Tech...

/ December 1, 2023
Ask an MSP Expert
Ask an MSP Expert: How do seasoned MSPs outsmart threats?

Ask an MSP Expert: How do seasoned MSPs outsmart threats?

In this edition of Ask an MSP Expert, we look at how with the ever-evolving cybersecurity landscape, managed service providers (MSPs) must be vigilant. This includes ensuring their managed security service offerings are up to the task of protecting their...

/ November 30, 2023
Optimizing resources to take your MSP business to the next level

Optimizing resources to take your MSP business to the next level

As an MSP, it is imperative to maximize profits while minimizing costs. However, cutting corners to lower capital and operating expenses can be disastrous: platforms can suffer from lower availability and stability levels, which can lead to unsatisfied customers. The...

/ November 29, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Citrix Bleed vulnerability actively exploited

Cybersecurity Threat Advisory: Citrix Bleed vulnerability actively exploited

Recently, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a cybersecurity advisory warning that ransomware groups are actively exploiting the ‘Citrix Bleed’ vulnerability. In this Cybersecurity Threat Advisory, we look at the Citrix...

/ November 29, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New vulnerability for Windows users

Cybersecurity Threat Advisory: New vulnerability for Windows users

A new vulnerability has been identified which could compromise the security of Windows users. The vulnerability discussed in this Cybersecurity Threat Advisory, known as “forced authentication,” gives an attacker access to a user’s NT LAN Manager (NTLM) tokens by tricking...

/ November 28, 2023
High demand for managed cloud services bodes well for MSPs

High demand for managed cloud services bodes well for MSPs

A survey of 500 IT decision-makers from North America, the United Kingdom, Benelux, and Australia finds that 93 percent plan to prioritize investing in cloud-managed services in the next 12 months, with respondents claiming cloud-managed services could increase productivity by...

/ November 28, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: ‘LittleDrifter’ extends its reach

Cybersecurity Threat Advisory: ‘LittleDrifter’ extends its reach

This Cybersecurity Threat Advisory sheds light on a recently discovered USB worm identified as “LittleDrifter” has been attributed to the Russia-linked hacker group known as Gamaredon. The worm has spread beyond its presumed intended target, Ukraine, to other countries including...

/ November 28, 2023
CRN Women on the Rise list includes a familiar name

CRN Women on the Rise list includes a familiar name

Every year, The Channel Company (CRN) recognizes a group of outstanding women on the rise who are reaching new heights at their company while putting partners first. This year we are excited to share that Kirsten Vogelsang, Partner Marketing Specialist at...

/ November 27, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Navigating holiday cyber risks

Cybersecurity Threat Advisory: Navigating holiday cyber risks

The holiday season is here, and organizations are facing an increased risk of cyberthreats with a notable focus on the activities of access brokers. These threat actors specialize in gaining and selling unauthorized access to organization accounts by orchestrating social...

/ November 27, 2023 / 13 Comments
Tech Time Warp: Kenzero more than Kenough in terms of problems

Tech Time Warp: Kenzero more than Kenough in terms of problems

It was obvious in the late 1990s and early 2000s—the heyday of peer-to-peer (P2P) file-sharing networks—that the concept was too good to be true. In this edition of Tech Time Warp, we will take a look at, aside from the...

/ November 24, 2023