Category: Featured

Are you leveraging your data effectively to demonstrate value?
As a customer of an MSP, it is great when everything goes well; no problems mean no need to constantly update things; no downtime to impact the business, and there is no reason to pay attention to what you are...

Three reasons to automate MSP business development
When they want to grow their firms, many MSP owners’ first solution is to hire more salespeople. I read an article a few years ago, whose author recommended that if your sales decline, your first response should be to hire...

The cybersecurity impact of recent bank failures
MSPs that have financial clients in their portfolios could well be forgiven for being a little jittery. Even industry experts were caught off guard by the sudden struggles in the banking sector. One bank sunk due to old-fashioned business practices,...

Tech Time Warp: Once upon a time, autofill was a novelty
At this point, autofill/autocomplete/autocorrect technology is such a part of our everyday lives that we laugh at autocorrect fails and avoid typing in our address while online shopping whenever possible. But, like everything in the technology world, this convenience was...

What is cyber liability insurance?
As the threat landscape evolves, an increasing number of businesses are turning to cyber liability insurance as a way to help mitigate risk. If you are considering cyber liability insurance for your organization, there are a few things that are...

Survey sees larger MSPs embracing AIOps
A global survey of 127 managed service providers (MSPs) with at least $25 million in revenue and more than 500 employees finds that the use of artificial intelligence to manage IT operations has significantly increased. Conducted on behalf of OpsRamp,...
Cybersecurity Threat Advisory: Microsoft Outlook elevation of privilege vulnerability
Last week, Microsoft Threat Intelligence discovered a critical elevation of privilege (EoP) vulnerability in Microsoft Outlook that allows for New Technology LAN Manager (NTLM) credentials to be stolen. Threat actors can potentially authenticate, escalate privileges, and gain access to the...

Tech Time Warp: How Street Fighter II revolutionized gaming
A crucial chapter in gaming history is receiving a fresh look in the new book Like a Hurricane: An Unofficial Oral History of Street Fighter II by Matt Leone.

Cybersecurity Threat Advisory: New phishing campaigns
Cybercriminals have started new phishing campaigns that targets organizations and individuals who were members of affected banks. Fraudulent messages are being sent in an attempt to trick victims into revealing personal/account information such as social security numbers, passwords, and account...

Digital business transformation needs driving demands for MSPs
A survey of 1,000 technology leaders conducted by Logicalis finds well over half (57 percent) expect to work more closely with managed service providers (MSPs) to achieve digital business transformation goals.