Category: Featured
Churn isn’t just a number — it’s a warning sign MSPs can’t ignore
Let’s get straight to the point: what’s your rate of customer churn? Are you happy with it? Keep in mind that the cost of replacing every lost customer is much higher than just keeping them in the first place. When...
Back to school, back to scams
As August fades into September, certain sights and sounds return like clockwork: bright yellow school buses rumbling down the roads, playgrounds echoing with the squeals of energetic children, and the slow shift of the seasons. As schools ease into their...
Tech Time Warp: The history of the Computer History Museum
It might seem a bit meta (not Meta!) for a technology history blog series to cover the history of the Computer History Museum, but the Silicon Valley institution is the mothership, and we certainly rely on its incredible web presence....
Cybersecurity Threat Advisory: Critical SAP NetWeaver vulnerabilities
Researchers have uncovered a chained vulnerability in SAP NetWeaver Visual Composer involving authentication bypass and insecure deserialization. These critical flaws—tracked as CVE-2025-31324 and CVE-2025-42999—are currently being exploited in an active threat campaign targeting exposed Visual Composer servers. Review the details...
CIRCIA compliance: What MSPs need to know now
The full implementation of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) is rapidly approaching, bringing with it a new package of rules and regulations that managed service providers (MSPs) must follow, at least those serving critical infrastructure clients....
Cybersecurity Threat Advisory: SonicWall VPN attacked
There has been a rise in ransomware attacks targeting SonicWall. Many incidents trace back to migrations from Gen 6 to Gen 7 firewalls, where local user passwords were carried over without being reset. Review this Cybersecurity Threat Advisory to ensure...
Tech Time Warp: Welchia—when the remedy was as bad as the malady
August 2003 was already challenging for network administrators. They were busy fending off the Blaster worm, whose payload caused computers to reboot every 60 seconds, so initially they may have reacted positively to news of the Welkin worm. Welkin was...
Cybersecurity Threat Advisory: Critical NetScaler Gateway vulnerability
A threat campaign is actively exploiting a critical vulnerability, CVE-2025-6543, in Citrix NetScaler ADC and Gateway appliances configured as a Gateway or AAA virtual server. Review this Cybersecurity Threat Advisory for detailed guidance and recommended actions to mitigate your risk....
Survey reveals the real IT priorities for 2025: Cybersecurity and cloud take the lead
A survey of over 1300 IT leaders finds that, while organizations are increasing investment in artificial intelligence (AI), they remain more focused on traditional challenges such as cybersecurity and cloud computing. Conducted by Experis, a managed and professional services provider...
