Category: Featured

Tip Tuesday: Create a growth plan to meet the demand for managed services

Tip Tuesday: Create a growth plan to meet the demand for managed services

Business is booming for managed service providers (MSPs). The as-a-service model has skyrocketed in popularity as more organizations embrace digitization and scalability. While that’s great news for MSPs, it also raises demand. If your business doesn’t already have a growth...

/ June 20, 2023 / 13 Comments
MSPs and the next wave of cybersecurity AI solutions

MSPs and the next wave of cybersecurity AI solutions

While cybersecurity researchers tend to revel in discovering vulnerabilities, many of the ones that do get disclosed require cybercriminals to have extensive expertise to exploit. Most cybercriminals today remain focused on launching attacks that use tried and true techniques and...

/ June 19, 2023
Tech Time Warp: Morto worm relishes on common usernames and weak passwords

Tech Time Warp: Morto worm relishes on common usernames and weak passwords

Before you read any more of this post, ask yourself: Are you using “administrator” as a username for any service? If the answer is yes, stop what you’re doing and change that immediately. Then return here to find out why....

/ June 16, 2023
An expert’s view for MSPs to stay ahead of the cybersecurity talent shortage

An expert’s view for MSPs to stay ahead of the cybersecurity talent shortage

While AI has been dominating the headlines in cyber circles throughout 2023, another less glamorous topic is just as acute: the cybersecurity talent shortage. We’ve covered this topic in the past, but the challenge continues. In the 2022 Cybersecurity Workforce...

/ June 15, 2023
Survey sheds light on SMB IT spending trends

Survey sheds light on SMB IT spending trends

A survey of 375 IT decision-makers within small-to-medium businesses in the U.S. suggests that planned investments in IT in 2023 are contracting slightly because of continuing economic headwinds. Conducted by Analysys Mason, a management consulting firm, the survey finds that...

/ June 14, 2023
Security is more than table stakes

Security is more than table stakes

Security has always seemed to be at the top of most organizations’ mind. At the same time, it is often a lower priority when setting aside discrete investment. Outsourcing functions to an MSP can be seen by many as a...

/ June 13, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: New remote control escalation vulnerability – updated

Cybersecurity Threat Advisory: New remote control escalation vulnerability – updated

Fortinet recently released updates for several products utilizing SSL-VPN functionalities after discovering a critical vulnerability. The major flaw discovered gives the ability to an attacker to perform an unauthenticated remote code execution on devices. Barracuda SOC recommends updating Fortinet products...

/ June 12, 2023
Pioneers in Tech: LGBTQ+ activist Edith Windsor’s first career

Pioneers in Tech: LGBTQ+ activist Edith Windsor’s first career

The late Edith Windsor is best known as the plaintiff in the 2013 Supreme Court case United States v. Windsor, which struck down the federal Defense of Marriage Act (DOMA) and helped paved the way for the legalization of same-sex...

/ June 9, 2023
Ask an MSP Expert: Top sales and marketing strategies to navigate a cautious market 

Ask an MSP Expert: Top sales and marketing strategies to navigate a cautious market 

The uncertain economy has many MSPs seeing fewer leads in their sales funnel as well as a longer sales cycle with extended negotiation rounds. The changes in prospect behaviors are impacting MSP business growth projections. To overcome this, Kendra Lee,...

/ June 8, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: “File Archiver in the Browser” exploits

Cybersecurity Threat Advisory: “File Archiver in the Browser” exploits

A new skilled and clever “File Archiver in the Browser” phishing trick that utilizes ZIP domains has surfaced. Bad actors can employ this technique to deceive users into downloading malicious files, compromise systems, and potentially gaining unauthorized access. What is...

/ June 7, 2023