Category: Featured

Why one “human” call to action on your MSP’s website is the right approach
When was the last time you went to a website and handed over your email address to download a white paper, video, or eBook? You probably can’t remember. A few years back, sure, it might have made sense. These days,...

How MSPs can turn IT crisis management into opportunity
Newton’s third law of physics holds that every action has an equal and opposite reaction. The recent global IT outage, impacting roughly 8.5 million devices running older variants of Windows, is no exception. The two most immediate impacts will be...

Cybersecurity Threat Advisory: Critical SAP vulnerabilities
SAP issued its August 2024 security patch update which included two critical flaws that enable attackers to bypass authentication and fully compromise affected systems. Review the details in this Cybersecurity Threat Advisory to learn how you can protect your SAP...

Cybersecurity Threat Advisory: EDRKillShifter, a growing threat
A cybercrime group associated with the RansomHub ransomware has been observed using a newly developed tool named “EDRKillShifter” to disable endpoint detection and response (EDR) software on compromised systems. This tool is the latest in a growing list of EDR-killing...

Cybersecurity Threat Advisory: Another zero-click Windows TCP/IP vulnerability
Another critical zero-click Windows vulnerability, identified as CVE-2024-38063, has been discovered in the Windows TCP/IP stack, affecting all systems with IPv6 enabled. Review this Cybersecurity Threat Advisory now to mitigate potential exploitation and protect your systems. What is the threat?...

Tech Time Warp: Reflecting on the Ken Thompson hack
In 1983, Ken Thompson and Dennis M. Ritchie received the prestigious A.M. Turing Award for “their development of generic operating systems theory and specifically for the implementation of the UNIX operating system.” However, this look back at technology history is...

Will MSPs have more license requirements in their future?
In 2019, Singapore became the first country in the world to require cybersecurity professionals to undergo a licensing and certification process. The trend has been slow to catch on. However, this year, Ghana and Malaysia joined Singapore in creating certification...

Cybersecurity Threat Advisory: Critical zero-click vulnerability in Microsoft Outlook
A critical zero-click remote code execution (RCE) vulnerability, identified as CVE-2024-30103, was recently discovered in Microsoft Outlook. This flaw allows malicious actors to execute arbitrary code on a victim’s system simply by opening a specially crafted email. Review the details...

Understanding email threats: The foundation of email security
In today’s digital landscape, email remains a fundamental communication tool for businesses. However, its ubiquity makes it a prime target for cyber threats. Understanding these threats is the first step in fortifying your email security. In this blog post, we’ll...

How MSPs can prepare for future PC outages
A recent global event has demonstrated how vital it is to maintain a reliable IT infrastructure. This is including its access points such as endpoint devices, as it is the backbone of many essential services. While the event may seem...