Category: Featured
Cybersecurity Threat Advisory: Microsoft zero-day exploit
This Cybersecurity Threat Advisory highlights a high-severity Microsoft Office and Windows HTML remote code execution vulnerability, CVE-2023-36884, with a base CVSS score of 8.3 has been discovered. Through this vulnerability attackers can execute arbitrary code on affected systems, leading to...
Tip Tuesday: Optimizing multi-cloud network management
Multi-cloud strategies are quickly becoming the norm for businesses today. Managed service providers (MSPs) offering cloud-based services can benefit from these architectures more than most, as their scalability and reliability create convenience for end users. However, managing multi-cloud networks can...
MSSPs need to stage cybersecurity interventions
A pair of reports conducted separately by Google and Cado Security make it clear that when it comes to cloud security, the biggest issues are mundane lapses that cybercriminals have learned to exploit easily. The Google report, for example, finds...
Pioneers in Tech: Logging birthday greetings to Gordon Bell
In this month’s edition of Pioneers in Tech, we wish a happy birthday to technology visionary Gordon Bell, who turns 89 August 19. Born in Kirksville, Missouri, Bell is a co-founder of what is today the Computer History Museum in...
Ten essential sales hunting skills for MSPs
Sales hunting is a critical role for managed service providers (MSPs). The first sales role most MSPs hire is an appointment setter or an outside salesperson whose primary responsibility will be prospecting for new clients. Before you hire, it’s important...
Insider threats continue to raise concerns
Much of the attention in cybersecurity has focused on overseas threats, such as the war in Ukraine and other robust cybercriminal activities in China and Iran. However, data shows that sometimes the most significant danger isn’t from some faraway hacker...
Biggest obstacle for MSSPs is customer overconfidence
One of the biggest issues any managed security services provider (MSSP) regularly encounters is, despite all evidence to the contrary, many IT and cybersecurity professionals remain convinced they have all the tools and processes needed to secure their IT environments....
Tech Time Warp: Worm named Code Red wakes users up to security risks
In this week’s tech time warp we look at how, following a month of DDoS attacks and security bulletins—including an attack on whitehouse.gov—computer users were on high alert Aug. 1, 2001, as they waited to see whether the Code Red...
Will AI be the next big thing?
As many a marketing or salesperson will attest, trying to flog the same old, same old becomes troublesome after a while. Something is needed to excite the market – and luckily, technology is an area where there is always something...