Category: Featured

MSPs caught in the tug-of-war over legacy systems

MSPs caught in the tug-of-war over legacy systems

Each Labor Day, the cost of IT labor invariably becomes a topic of discussion. After all, even in the age of artificial intelligence (AI), the single biggest segment of any IT budget remains staffing. The cost incurred depends greatly on...

/ September 4, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Passwordstate emergency patch released

Cybersecurity Threat Advisory: Passwordstate emergency patch released

Click Studios has released an emergency update for Passwordstate 9.9 to address a high-severity security vulnerability. According to the changelog, the flaw could be exploited to bypass authentication. Review the details in this Cybersecurity Threat Advisory to reduce your risk...

/ September 3, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical FreePBX zero-day vulnerability

Cybersecurity Threat Advisory: Critical FreePBX zero-day vulnerability

Researchers have discovered a zero-day vulnerability in Sangoma FreePBX, identified as CVE-2025-57819. This flaw allows unauthenticated remote attackers to take control of affected PBX systems, potentially resulting in remote code execution (RCE), arbitrary database manipulation, and full system compromise. Review...

/ September 3, 2025
Back to school, back to scams part 2: Mitigation in motion

Back to school, back to scams part 2: Mitigation in motion

As students and faculty return to campuses across the nation this fall, they’re not the only ones getting back into the swing of things. Cybercriminals are also sharpening their pencils – or rather, their phishing emails and ransomware attacks –...

/ September 2, 2025
Evil-GPT
Evil-GPT: The “Enemy of ChatGPT”

Evil-GPT: The “Enemy of ChatGPT”

In the ever-evolving landscape of cybercrime, one tool has emerged as a particularly insidious player: Evil-GPT. Marketed on hacker forums on the dark web as the “ultimate enemy of ChatGPT” and the “best alternative to WormGPT,” this malicious artificial intelligence...

/ September 1, 2025
Tech Time Warp
Tech Time Warp: The lovable and luggable Compaq Portable

Tech Time Warp: The lovable and luggable Compaq Portable

August 27 marked the 32nd anniversary of the release of the Compaq Presario. This was a family of PCs that included a monitor, a modem, and, for many, their first America Online CD-ROM. Learn more in this edition of Tech...

/ August 29, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Citrix patches NetScaler flaws

Cybersecurity Threat Advisory: Citrix patches NetScaler flaws

Citrix has issued patches for three zero-day vulnerabilities affecting NetScaler ADC and Gateway, including one that attackers have already begun exploiting. Review the details in this Cybersecurity Threat Advisory to reduce your risk from these threats. What is the threat?...

/ August 28, 2025
Data center
Data center drought: MSPs scramble for capacity

Data center drought: MSPs scramble for capacity

In the months and years ahead, many IT leaders will urgently turn to managed service providers (MSPs) to help them find IT infrastructure resources to run their workloads. An analysis of the data center colocation market was published by JLL,...

/ August 28, 2025
Churn isn’t just a number — it’s a warning sign MSPs can’t ignore

Churn isn’t just a number — it’s a warning sign MSPs can’t ignore

Let’s get straight to the point: what’s your rate of customer churn? Are you happy with it? Keep in mind that the cost of replacing every lost customer is much higher than just keeping them in the first place.  When...

/ August 27, 2025
Cyberthreats
Back to school, back to scams

Back to school, back to scams

As August fades into September, certain sights and sounds return like clockwork: bright yellow school buses rumbling down the roads, playgrounds echoing with the squeals of energetic children, and the slow shift of the seasons. As schools ease into their...

/ August 26, 2025