Category: Featured

data infrastructure
Managed data infrastructure services gaining momentum

Managed data infrastructure services gaining momentum

Data creation and storage are growing exponentially, and more organizations are turning to managed service providers (MSPs) to handle the infrastructure needed to process it. A survey of nearly 200 IT leaders conducted by DataStrike, a provider of managed IT...

/ December 26, 2024
deals
‘Tis the season for ‘special deals’ – or is it?

‘Tis the season for ‘special deals’ – or is it?

With Black Friday now stretching over a week (or more in many cases) and overlapping with Cyber Monday, which then blends into holiday deals and New Year specials, it’s hard to miss special offers from early November through the end...

/ December 25, 2024
SOC case files
The SOC case files: XDR neutralizes threat targeting MSP

The SOC case files: XDR neutralizes threat targeting MSP

This edition of the SOC case files showcases how an incident was detected, contained, and mitigated in about a minute. The SOC is part of Barracuda Managed XDR, an extended visibility, detection, and response (XDR) service. It provides customers with...

/ December 24, 2024
2024 cybersecurity
Experts look back at 2024’s cybersecurity news

Experts look back at 2024’s cybersecurity news

The year 2024 was full of cybersecurity news. It was a year of data breaches, ransomware, the rise of quantum computing, and much more. The only constant was change. As ransomware continued to wreak havoc, according to Security Intelligence, ransomware...

/ December 24, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Three critical Sophos firewall vulnerabilities

Cybersecurity Threat Advisory: Three critical Sophos firewall vulnerabilities

Sophos has disclosed three critical vulnerabilities in its firewall product that could allow remote unauthenticated attackers to perform structured query language (SQL) injection, execute arbitrary code, and gain privileged secure shell (SSH) access to affected devices. Review the details of...

/ December 23, 2024
Ask an MSP Expert: Key strategies to converting leads

Ask an MSP Expert: Key strategies to converting leads

Converting leads into sales pipeline is an art, and it starts with the initial conversation you have with a lead. Whether you opt for a phone call or email, the timing and approach are key factors in moving the lead...

/ December 23, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Adobe ColdFusion vulnerability

Cybersecurity Threat Advisory: Adobe ColdFusion vulnerability

A vulnerability within Adobe ColdFusion could result in arbitrary system file reads and writes. Continue reading this Cybersecurity Threat Advisory to learn how to mitigate your risk. What is the threat? The vulnerability, tracked as CVE-2024-20767, was found within the...

/ December 21, 2024
Tech Time Warp
Tech Time Warp: Santy comes to town

Tech Time Warp: Santy comes to town

Twenty years ago, network administrators found themselves dealing with an unwelcome holiday visitor: not Santa, but Santy. Learn all about it in this edition of Tech Time Warp. The Santy worm was malware written in the Perl language. It didn’t...

/ December 20, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Windows kernel vulnerability

Cybersecurity Threat Advisory: Critical Windows kernel vulnerability

A pointer dereference weakness was discovered within the Microsoft Kernel Streaming Service that would allow an attacker to escalate their privileges to SYSTEM without any user interaction being required. Review the details in this Cybersecurity Threat Advisory to learn how...

/ December 20, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New social engineering campaign

Cybersecurity Threat Advisory: New social engineering campaign

An active social engineering campaigns uses Microsoft Teams and AnyDesk to deploy DarkGate malware. Attackers are impersonating trusted contacts during Teams calls to deceive victims into installing remote access tools, facilitating unauthorized system access, and deploying the malware. Review the...

/ December 20, 2024