Category: Featured

As hackers become more proficient, organizations face devastating financial consequences

As hackers become more proficient, organizations face devastating financial consequences

In a turbulent and uncertain economy, it is more important than ever to have a strong cybersecurity strategy that mitigates risks to data and the balance sheet. Ponemon Institute’s study on cybernomics, sponsored by Barracuda, reveals the potential serious financial...

/ January 24, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical Atlassian Confluence vulnerability

Cybersecurity Threat Advisory: Critical Atlassian Confluence vulnerability

A critical Atlassian Confluence template injection vulnerability has been identified. It affects all outdated versions of Confluence Data Center and Server, allowing unauthenticated attackers to achieve remote code execution (RCE). Read this Cybersecurity Threat Advisory in detail to learn about...

/ January 23, 2024
Kubernetes adoption reaching critical mass for MSPs

Kubernetes adoption reaching critical mass for MSPs

A survey of 333 IT operations and application development stakeholders directly responsible for Kubernetes in production environments suggests Kubernetes adoption has hit a critical mass point. This means managed service providers (MSPs) will be increasingly relied on to assist with...

/ January 23, 2024
Tip Tuesday
Tip Tuesday: How to train your team to work alongside AI

Tip Tuesday: How to train your team to work alongside AI

Artificial intelligence (AI) is rapidly becoming more readily available and beginning to change many processes. The progress has caused many managed service providers (MSPs) to explore how their teams could use the technology to improve workflows. If you’re considering that...

/ January 23, 2024
Five steps to collecting valuable customer testimonials

Five steps to collecting valuable customer testimonials

In my experience, a customer is only too willing to help a business they enjoy working with to be successful. Remember this statement, as you think of the right way to approach a customer. If done in the wrong way,...

/ January 22, 2024
Tech Time Warp
Tech Time Warp: Happy mail? Not so much back in 1999

Tech Time Warp: Happy mail? Not so much back in 1999

In this edition of Tech Time Warp we see how the email users of January 1999 were an innocent bunch. Fresh from seeing “You’ve Got Mail” at the box office, they received emails with the attachment Happy99.exe. They thought nothing...

/ January 19, 2024
Opportunities arise for MSPs despite skills shortages

Opportunities arise for MSPs despite skills shortages

A survey of 2,740 IT decision-makers conducted by Skillsoft, finds only 16 percent plan to rely more on third parties for support despite ongoing skills shortages. Instead, a full 45 percent plan to invest in more training for their existing...

/ January 18, 2024
The three email threat types that are hardest for users to detect

The three email threat types that are hardest for users to detect

There’s a question that all organizations need to be asking themselves when it comes to securing their email security posture: Do my users know how to distinguish between a legitimate email and an email threat? Some businesses are able to invest...

/ January 18, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco Unity Connection vulnerability

Cybersecurity Threat Advisory: Cisco Unity Connection vulnerability

A new Cisco Unity Connection vulnerability, designated as CVE-2024-20272, has been discovered which poses a significant risk to organizations utilizing Cisco Unity Connection. Read this Cybersecurity Threat Advisory in detail to learn about the vulnerability and how to secure your...

/ January 17, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: SonicWall vulnerable to DoS attacks

Cybersecurity Threat Advisory: SonicWall vulnerable to DoS attacks

SonicWall firewalls are found to be vulnerable to two Denial of Service (DoS) attacks which can be caused by using the same vulnerable code pattern. Various research indicates SonicWall firewalls with management interfaces exposed online are vulnerable to one or...

/ January 17, 2024