Category: Featured

Top cybersecurity misconfigurations MSPs should address
As we embrace spring, the fall seems to be nothing but a memory. While 2024 holds new trends, threats, and opportunities for MSPs, there are still a few things to keep in mind from 2023. In October of last year,...

How attackers weaponize generative AI through data poisoning and manipulation
The generative AI models that today power chatbots, online search queries, customer interactions, and more are known as large language models (LLMs). The LLMs are trained on vast volumes of data and then use that data to create more data,...

Cybersecurity Threat Advisory: XZ Utils supply chain vulnerability
A supply chain vulnerability was found in XZ Utils that creates a backdoor into OpenSSH and can lead to remote code execution (RCE). Read this Cybersecurity Threat Advisory to learn about this supply chain vulnerability and how to reduce your...

Spring-cleaning checklist for defending against ransomware
Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

Tech Time Warp: Don’t take Windows for granted
When was the last time you thought about how easy Windows makes your life? Seriously, though: Now, the ease with which you move from application to application, use keyboard shortcuts, and even resolve crashes with CTRL+ALT+DEL just feels like functionality...

Healthcare wearables are a growing opportunity for MSPs
Healthcare wearables are exploding in popularity, but their use goes beyond the fun apps that allow you to track how many steps you’ve taken each day. Today, heart rate, blood sugar, oxygen levels, blood pressure, and other parameters are monitored...

How artificial intelligence is changing the threat landscape
the There has been a lot of talk about artificial intelligence (AI) and its impact on businesses. In this particular post, we will try to answer the most pertinent question: How has AI changed the threat landscape? This is like...

Data tampering is an underrated threat — get your backup ready
World Backup Day is an annual reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business. Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly...

Tech Time Warp: The wicked ways of the Witty Worm
Although the goal of the Witty Worm wasn’t widespread damage—its entire target population was only 12,000 computers the world over—the malware made its presence known with a vengeance. Within 45 minutes of its first appearance at approximately 8:45 p.m. PST...

Cybersecurity Threat Advisory: AWS ‘FlowFixation’ vulnerability
The AWS “FlowFixation” vulnerability, while patched in September 2023, may still pose account hijacking risks within its Amazon Managed Workflows Apache Airflow (MWAA) service. Read this Cybersecurity Threat Advisory to learn the impact and security measures to mitigate risks associated...