Category: Featured

Identity theft and identity fraud: What they are and how to fight back

Identity theft and identity fraud: What they are and how to fight back

The United States Department of Justice (DOJ) does not spell out any distinction between identity theft and identity fraud, saying only that they: “…are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s...

/ September 12, 2022
Pioneers in Tech: Charles Simonyi, the brain behind Word and Excel

Pioneers in Tech: Charles Simonyi, the brain behind Word and Excel

It’s estimated at least 1.2 billion people worldwide use Microsoft Office products. The tech pioneer behind the flagship Office programs Word and Excel is the fascinating Charles Simonyi, whose Microsoft success has enabled him to become the first repeat space...

/ September 9, 2022
Tech Time Warp: News leaks about Library of Congress plan to go digital

Tech Time Warp: News leaks about Library of Congress plan to go digital

Nowadays, one expects major museums and institutions such as the Library of Congress (LOC) to have online catalogs and exhibitions. But it wasn’t that long ago that such an online presence was a groundbreaking proposition. This week’s Tech Time Warp...

/ September 2, 2022
MSSPs must defend their value proposition during an economic downturn

MSSPs must defend their value proposition during an economic downturn

Managed security service providers (MSSPs) are going to need to prove their worth during an economic downturn that has security leaders starting to ask tougher questions about the value of their services. A Forrester Planning Guide 2023: Security & Risk...

/ September 1, 2022 / 7 Comments
Special offers can turn prospects into customers

Special offers can turn prospects into customers

As an MSP, customer loyalty can be a challenge – but first, there is the need to turn a prospect into a customer. These two areas can be inextricably linked: if an MSP operates as a completely open entity where...

/ August 31, 2022
Canadian cybersecurity complacency is a slippery slope

Canadian cybersecurity complacency is a slippery slope

Statistics and polls show that residents of the United States are concerned about cybersecurity and a recent survey conducted late in 2021 illustrates this: The poll by The Pearson Institute and The Associated Press-NORC Center for Public Affairs Research shows...

/ August 30, 2022
Partner Spotlight: Managed XDR becomes a key offering for MSP

Partner Spotlight: Managed XDR becomes a key offering for MSP

Established in Dublin, Ireland in 1953, MJ Flood Technology has regionally expanded over the years. They currently operate in Dublin, Athlone, Belfast, Cork, Galway, Limerick, Sligo, Wexford, and Waterford. MJ Flood Technology has grown to be a leading provider of...

/ August 29, 2022
Tech Time Warp: Linus Torvalds introduces Linux

Tech Time Warp: Linus Torvalds introduces Linux

They say hindsight is 20/20, which is why Linus Torvalds’ Aug. 25, 1991, message to a MINIX newsgroup is so humorous now: “I’m doing a (free) operating system (just a hobby, won’t be big and professional like gnu) … it...

/ August 26, 2022
Changing cyber insurance requirements create managed security challenges

Changing cyber insurance requirements create managed security challenges

As cyber insurance requirements become more stringent, managed service providers (MSPs) are finding a need to make sure clients that don’t implement appropriate levels of security, either sign a waiver or find another provider. When the first wave of ransomware...

/ August 25, 2022 / 5 Comments
Tech Time Warp: Shamoon virus makes its first appearance

Tech Time Warp: Shamoon virus makes its first appearance

On Aug. 15, 2012, someone with high levels of network access at Saudi Aramco, one of the world’s largest oil companies, unleashed a virus that wiped data from more than 30,000 computers. The release of Shamoon is considered one of...

/ August 19, 2022