Category: Featured

e-waste
MSP tips to properly dispose e-waste

MSP tips to properly dispose e-waste

Managed service providers (MSPs) have a lot to do when it comes to keeping their clients safe. For example, they must watch patches, firewalls, IoT, and even dumpsters. While it is illegal to toss electric waste (e-waste) into the dumpster...

/ August 22, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Your Oracle NetSuite data may be exposed

Cybersecurity Threat Advisory: Your Oracle NetSuite data may be exposed

Researchers discovered that externally-facing Oracle NetSuite e-commerce sites may expose sensitive customer information when configured inaccurately. Review the details in this Cybersecurity Threat Advisory to learn best practices to mitigate your business risk. What is the threat? It is found...

/ August 22, 2024
Neal Bradbury on driving innovation for the channel at Barracuda

Neal Bradbury on driving innovation for the channel at Barracuda

For our long-term subscribers and those who have been in the managed services industry for the past two decades, you may be familiar with Neal Bradbury, who co-founded Intronis, a managed service provider (MSP) focused data protection company.   Recently appointed...

/ August 22, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Exploited Jenkins vulnerability

Cybersecurity Threat Advisory: Exploited Jenkins vulnerability

The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability found in Jenkins, identified as CVE-2024-23897 with a CVSS score of 9.8, to its Known Exploited Vulnerabilities (KEV) catalogue. This vulnerability is a path traversal flaw within the...

/ August 21, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Exploited Microsoft zero-day flaw

Cybersecurity Threat Advisory: Exploited Microsoft zero-day flaw

The hacker group Lazarus recently exploited a patched, zero-day flaw in Microsoft Windows. The vulnerability, tracked as CVE-2024-38193 with a CVSS score of 7.8, is a Bring Your Own Vulnerable Driver (BYOVD) vulnerability for Winsock. Continue reading this Cybersecurity Threat...

/ August 21, 2024
ransomware threat
Threat Spotlight: How ransomware for rent rules the threat landscape

Threat Spotlight: How ransomware for rent rules the threat landscape

This year’s annual review of ransomware attacks looks at the threat from two perspectives. First, for the third year running we’ve taken a global sample of reported ransomware attacks and analyzed what they tell us about ransomware attackers and their...

/ August 21, 2024
IT Budget
Tip Tuesday: Budget-friendly IT upgrades

Tip Tuesday: Budget-friendly IT upgrades

As a managed service provider (MSP), you undoubtedly encounter clients who need to upgrade their IT capabilities but want to do so while staying mindful of their budgets. Sticking to a budget can: Prevent unwanted financial consequences. Show investors the...

/ August 20, 2024
website
Why one “human” call to action on your MSP’s website is the right approach

Why one “human” call to action on your MSP’s website is the right approach

When was the last time you went to a website and handed over your email address to download a white paper, video, or eBook? You probably can’t remember. A few years back, sure, it might have made sense. These days,...

/ August 20, 2024
MSPs IT
How MSPs can turn IT crisis management into opportunity

How MSPs can turn IT crisis management into opportunity

Newton’s third law of physics holds that every action has an equal and opposite reaction. The recent global IT outage, impacting roughly 8.5 million devices running older variants of Windows, is no exception. The two most immediate impacts will be...

/ August 19, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical SAP vulnerabilities

Cybersecurity Threat Advisory: Critical SAP vulnerabilities

SAP issued its August 2024 security patch update which included two critical flaws that enable attackers to bypass authentication and fully compromise affected systems. Review the details in this Cybersecurity Threat Advisory to learn how you can protect your SAP...

/ August 19, 2024