Category: Featured
Tech Time Warp: The Conficker case study
Conficker was a nasty piece of malware that first emerged on the scene in November 2008. By April 1, 2009, many security experts and computer users were bracing themselves for the worst: a predicted “menacing” new phase as machines infected...
What soaring cloud demand and supply constraints mean for MSPs
A report from market research firm Omdia finds that global spending on cloud infrastructure continues to accelerate, with spending in the fourth quarter of 2025 reaching $110.9 billion—a 29 percent increase year over year. Cloud providers see strong growth momentum...
If you’re an MSP owner who wants more consistent leads, start here
As someone who’s spent the last 8+ years helping hundreds of MSPs generate leads and book real sales conversations, I hear the same frustration over and over again: “We’re doing some marketing… but leads are inconsistent.” Some months are busy....
World Backup Day: A timely reminder for MSPs to lead with resilience
It’s World Backup Day! This is a global reminder that data loss is far more common—and more damaging—than many organizations realize. In fact, 21 percent of people have never backed up their data, while 29 percent of data loss incidents...
Making the case for a layered email security approach
MSPs have a lot of ground to cover with their clients. In addition to providing protection, there’s also persuasion. Many MSPs find themselves needing to justify additional cybersecurity investments at a time when budgets are under scrutiny—and that can make...
Tech Time Warp: A salute to the floppy disk, the foundation of “sneakernet”
The denizens of Gen Z and Gen Alpha may have never used floppy disks, and they may have never given much thought to what the “Save” icon represents. And, like the giant cell phones of the 1990s, the floppy disk...
Cybersecurity Threat Advisory: Apple security updates for iOS vulnerabilities
Apple has released urgent security updates for older iPhones and iPads to address multiple vulnerabilities actively exploited in the wild via the Coruna exploit kit—a sophisticated attack framework used by both espionage groups and cybercriminals. Read this Cybersecurity Threat Advisory...
Cybersecurity Threat Advisory: PureLog Stealer malware campaign
A new malware campaign is using deceptive copyright infringement notices to distribute PureLog Stealer, targeting organizations across multiple sectors and countries. The malware operates primarily in memory and employs evasion techniques such as DLL sideloading to bypass traditional security controls....
Beyond recovery: The new resilience mindset
A global survey of 1,000 business and IT decision‑makers and senior developers shows that while organizations feel more resilient than they were a year ago, many still struggle with the cost of recovery and remediation when a real IT incident...
Cybersecurity Threat Advisory: Critical NetScaler ADC and Gateway vulnerability
Citrix has released security updates to address a critical information disclosure vulnerability affecting NetScaler ADC and NetScaler Gateway. The flaw allows unauthenticated remote attackers to retrieve sensitive information from vulnerable appliances via the HTTP/HTTPS interface. Read this Cybersecurity Threat Advisory...
