Category: Featured

website
Why one “human” call to action on your MSP’s website is the right approach

Why one “human” call to action on your MSP’s website is the right approach

When was the last time you went to a website and handed over your email address to download a white paper, video, or eBook? You probably can’t remember. A few years back, sure, it might have made sense. These days,...

/ August 20, 2024
MSPs IT
How MSPs can turn IT crisis management into opportunity

How MSPs can turn IT crisis management into opportunity

Newton’s third law of physics holds that every action has an equal and opposite reaction. The recent global IT outage, impacting roughly 8.5 million devices running older variants of Windows, is no exception. The two most immediate impacts will be...

/ August 19, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical SAP vulnerabilities

Cybersecurity Threat Advisory: Critical SAP vulnerabilities

SAP issued its August 2024 security patch update which included two critical flaws that enable attackers to bypass authentication and fully compromise affected systems. Review the details in this Cybersecurity Threat Advisory to learn how you can protect your SAP...

/ August 19, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: EDRKillShifter, a growing threat

Cybersecurity Threat Advisory: EDRKillShifter, a growing threat

A cybercrime group associated with the RansomHub ransomware has been observed using a newly developed tool named “EDRKillShifter” to disable endpoint detection and response (EDR) software on compromised systems. This tool is the latest in a growing list of EDR-killing...

/ August 17, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Another zero-click Windows TCP/IP vulnerability

Cybersecurity Threat Advisory: Another zero-click Windows TCP/IP vulnerability

Another critical zero-click Windows vulnerability, identified as CVE-2024-38063, has been discovered in the Windows TCP/IP stack, affecting all systems with IPv6 enabled. Review this Cybersecurity Threat Advisory now to mitigate potential exploitation and protect your systems. What is the threat?...

/ August 16, 2024
Tech Time Warp
Tech Time Warp: Reflecting on the Ken Thompson hack

Tech Time Warp: Reflecting on the Ken Thompson hack

In 1983, Ken Thompson and Dennis M. Ritchie received the prestigious A.M. Turing Award for “their development of generic operating systems theory and specifically for the implementation of the UNIX operating system.” However, this look back at technology history is...

/ August 16, 2024
cybersecurity
Will MSPs have more license requirements in their future?

Will MSPs have more license requirements in their future?

In 2019, Singapore became the first country in the world to require cybersecurity professionals to undergo a licensing and certification process. The trend has been slow to catch on. However, this year, Ghana and Malaysia joined Singapore in creating certification...

/ August 15, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical zero-click vulnerability in Microsoft Outlook

Cybersecurity Threat Advisory: Critical zero-click vulnerability in Microsoft Outlook

A critical zero-click remote code execution (RCE) vulnerability, identified as CVE-2024-30103, was recently discovered in Microsoft Outlook. This flaw allows malicious actors to execute arbitrary code on a victim’s system simply by opening a specially crafted email. Review the details...

/ August 15, 2024
Email security
Understanding email threats: The foundation of email security

Understanding email threats: The foundation of email security

In today’s digital landscape, email remains a fundamental communication tool for businesses. However, its ubiquity makes it a prime target for cyber threats. Understanding these threats is the first step in fortifying your email security. In this blog post, we’ll...

/ August 14, 2024
mitigate risks
How MSPs can prepare for future PC outages

How MSPs can prepare for future PC outages

A recent global event has demonstrated how vital it is to maintain a reliable IT infrastructure. This is including its access points such as endpoint devices, as it is the backbone of many essential services. While the event may seem...

/ August 14, 2024