Category: Featured

Drones: Flying security opportunities for MSPs
As they continue to grow in popularity, drones are increasingly being included in managed service providers’ (MSPs) hardware and software management packages. For most MSPs, this is a natural extension, as drones are becoming more widely used in commercial applications,...

Cybersecurity Threat Advisory: NTLM password hash leaks
This Cybersecurity Threat Advisory highlights a new Microsoft vulnerability that attackers are actively exploiting to steal NTLM (NT LAN Manager) hashes. Read the full article to learn the severity of the threat and recommendations to mitigate the organization’s risks. What...

Cybersecurity Threat Advisory: Critical Atlassian Confluence vulnerability
A critical Atlassian Confluence template injection vulnerability has been identified. It affects all outdated versions of Confluence Data Center and Server, allowing unauthenticated attackers to achieve remote code execution (RCE). Read this Cybersecurity Threat Advisory in detail to learn about...

Kubernetes adoption reaching critical mass for MSPs
A survey of 333 IT operations and application development stakeholders directly responsible for Kubernetes in production environments suggests Kubernetes adoption has hit a critical mass point. This means managed service providers (MSPs) will be increasingly relied on to assist with...

Tip Tuesday: How to train your team to work alongside AI
Artificial intelligence (AI) is rapidly becoming more readily available and beginning to change many processes. The progress has caused many managed service providers (MSPs) to explore how their teams could use the technology to improve workflows. If you’re considering that...

Five steps to collecting valuable customer testimonials
In my experience, a customer is only too willing to help a business they enjoy working with to be successful. Remember this statement, as you think of the right way to approach a customer. If done in the wrong way,...

Tech Time Warp: Happy mail? Not so much back in 1999
In this edition of Tech Time Warp we see how the email users of January 1999 were an innocent bunch. Fresh from seeing “You’ve Got Mail” at the box office, they received emails with the attachment Happy99.exe. They thought nothing...

Opportunities arise for MSPs despite skills shortages
A survey of 2,740 IT decision-makers conducted by Skillsoft, finds only 16 percent plan to rely more on third parties for support despite ongoing skills shortages. Instead, a full 45 percent plan to invest in more training for their existing...

The three email threat types that are hardest for users to detect
There’s a question that all organizations need to be asking themselves when it comes to securing their email security posture: Do my users know how to distinguish between a legitimate email and an email threat? Some businesses are able to invest...