Category: Featured

MSP at the forefront against credential stuffing

MSP at the forefront against credential stuffing

Credential stuffing has been around for a while, and it is exactly what it sounds like: an attack in which hackers use a cache of compromised usernames and passwords to break into a system. However, hackers have recently found new...

/ September 26, 2024
AI MSP
AI drives profit and revenue for MSPs and consultants

AI drives profit and revenue for MSPs and consultants

Recent studies by Canalys and Channel Futures project managed service provider (MSP) revenue to grow 11% or more in 2024. The Channel Futures study reveals that 62% of MSPs increased their artificial intelligence (AI) deployments and consultations in the fourth quarter...

/ September 26, 2024
Accelerating cybersecurity Time to Resolution (TTR)

Accelerating cybersecurity Time to Resolution (TTR)

When it comes to cyberattacks and data breaches, time to respond (TTR) is a critical metric for managed service providers (MSPs), but one that can be challenging as the frequency and sophistication of threats continue to evolve. MSPs typically have...

/ September 25, 2024
cta
What do the “perfect” CTAs look like on an MSP website?

What do the “perfect” CTAs look like on an MSP website?

Call-to-actions (CTAs) are what everything on your managed service provider (MSP) website leads to. In most cases, a CTA involves a website visitor entering their information (name, email, phone number, etc.) for something in return, such as a consultation, meeting,...

/ September 24, 2024
MSPs to chart a course for GenAI complexities

MSPs to chart a course for GenAI complexities

Organizations that are at the forefront of adopting generative artificial intelligence (GenAI) are running into a plethora of issues. A survey of 1,500 AI practitioners and decision-makers conducted by S&P Global Market Intelligence on behalf of WEKA finds that, on average,...

/ September 23, 2024
Tech Time Warp
Tech Time Warp: The impetus for U.S. national security policy was… a teen movie?

Tech Time Warp: The impetus for U.S. national security policy was… a teen movie?

“Is this a game, or is it real?” Eighties movie buffs will recognize this famous line from 1983’s WarGames, where Matthew Broderick plays a teenager who hacks into a defense department computer system. After Broderick’s character guesses an insecure password...

/ September 20, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical GitLab SAML vulnerability

Cybersecurity Threat Advisory: Critical GitLab SAML vulnerability

A vulnerability identified as CVE-2024-45409 has been found in GitLab’s Ruby-SAML library. This flaw stems from the improper validation of Security Assertion Markup Language (SAML) responses. Continue reading this Cybersecurity Threat Advisory to secure your environment. What is the threat?...

/ September 20, 2024
The power of hosted remote desktops for MSPs

The power of hosted remote desktops for MSPs

In my last piece, I discussed how using hosted remote desktops can minimize risks should a major incident occur. Beyond reducing risks, the use of remote desktops provides a lot more than just basic access capabilities. Reduce helpdesk calls and...

/ September 19, 2024
scalable backup
The benefits of Barracuda’s new scalable backup

The benefits of Barracuda’s new scalable backup

Data is money, and data protection is a key piece of any business continuity plan or cybersecurity strategy. This is a concern for companies that need an increasing amount of storage and backup capacity but have no extra budget to...

/ September 18, 2024
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: SolarWinds ARM vulnerabilities

Cybersecurity Threat Advisory: SolarWinds ARM vulnerabilities

SolarWinds has issued patches to address two vulnerabilities in its Access Rights Manager (ARM) software. Out of the two, one is a critical vulnerability that can lead to remote code execution (RCE). Review the details within this Cybersecurity Threat Advisory...

/ September 18, 2024