Category: Featured
Quantum hasn’t taken a quantum leap – yet
While artificial intelligence (AI) has been sucking all the oxygen out of the room when it comes to IT discussion and hype, another change is on the horizon. It may be just as consequential, and managed service providers (MSPs) would...
Tip Tuesday: Crafting custom AI strategies for SMBs
Artificial intelligence (AI) is the most disruptive technology of our time. However, as more organizations capitalize on this technology, managed service providers (MSPs) could experience substantial growth. Small and medium businesses (SMBs) may lack the internal resources and skills to...
MSPs have an opportunity to change the cybersecurity game
For as long as anyone can remember, cybersecurity has been a game of whac-a-mole where resources are hopefully marshaled in time to thwart a threat either before damage is inflicted or, at the very least, as quickly as possible once...
Tech Time Warp: The history of Patch Tuesday
Mondays are manic, Wednesday is Hump Day, Thursdays are thirsty, and TGIF. What about poor Tuesday? Well, for the past 20 years, Tuesday has been the responsible workday, thanks to Microsoft. In this edition of Tech Time Warp, we see...
Inbound vs. outbound marketing: Which is right for your MSP?
As a small to mid-sized managed service provider (MSP) owner, you’ve probably relied heavily on word-of-mouth referrals. There’s absolutely nothing wrong with this. Word-of-mouth is the best lead generator – it shows you do great work, prospects are already excited...
Cybersecurity Threat Advisory: Active exploitation of Microsoft vulnerability
Microsoft announced that a recently disclosed security flaw had been exploited just one day after it released fixes for the vulnerability. CVE-2024-21410, an Exchange Server vulnerability, with a CVSS score of 9.8, allows threat actors to escalate privileges of the...
Tech Time Warp: No one is sending you pics of Anna Kournikova
As your mother told you, if it’s too good to be true, it probably is. And that’s as true today as it was 23 years ago when “OnTheFly,” a 20-year-old Dutch programmer/hacker, used a computer virus to proclaim his adoration...
How to help your clients comply with new Google and Yahoo email requirements
When it comes to email security, most of the focus is on what happens when a malicious email is received. Optimally, a multi-layered approach will help filter out phishing emails and other attacks via technology and user training. But some...
Cybersecurity Threat Advisory: New Ivanti vulnerability
Ivanti has warned customers of a new security flaw that could allow attackers to bypass authentication. The vulnerability, CVE-2024-22024, has received a CVSS score of 8.3. Read this Cybersecurity Threat Advisory to learn the significant risk this threat poses to...
