Category: Featured

Ask an MSP Expert: How to build a prospecting plan to achieve your goals

Ask an MSP Expert: How to build a prospecting plan to achieve your goals

With the start of a new year, many MSPs are looking for new ways to grow their business. Truth be told, there’s no secret weapon out there that can help you grow your business. However, honing-in on your sales strategy...

/ February 22, 2023
Java app migration to the cloud increases

Java app migration to the cloud increases

A pair of surveys suggests that there will be an increase in migration of legacy Java applications, which have largely run in on-premises IT environments, into the cloud.

/ February 21, 2023
Tech Time Warp: Mocmex sneaks in via digital photo frame

Tech Time Warp: Mocmex sneaks in via digital photo frame

“Beware of Greeks bearing gifts” is the old saying associated with the story of the Trojan horse—the same story that gives Trojan viruses their name. In 2008, however, a more appropriate saying would have been “Beware of relatives bearing digital...

/ February 17, 2023
What else is on the horizon for MSPs in 2023?

What else is on the horizon for MSPs in 2023?

We see many reports each year, but when a Google-owned entity puts out its thoughts, we tend to pay closer attention. Recently, Google subsidiary Mandiant released its 2023 cybersecurity threat report highlighting trends to keep an eye on in the...

/ February 16, 2023
Will ‘cloud repatriation’ hurt you?

Will ‘cloud repatriation’ hurt you?

Reports are starting to emerge that some organisations are bringing workloads from the cloud back to owned datacentres as the benefits of cloud computing they had hoped for have not been achieved. Many MSPs operate on a cloud basis –...

/ February 15, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Malicious packages found in Python Package Index (PyPI)

Cybersecurity Threat Advisory: Malicious packages found in Python Package Index (PyPI)

New malicious packages were discovered on the Python Package Index (PyPI) that can steal passwords, authentication cookies, and cryptocurrency wallets from developers.

/ February 14, 2023
Containers finally cross chasm of mainstream adoption

Containers finally cross chasm of mainstream adoption

Containers as a software artifact used in applications may have finally crossed the proverbial chasm of adoption. A report published by JFrog, a provider of a platforms for building and deploying applications, based on analysis of how more than 7,000...

/ February 13, 2023
Pioneers in Tech: Roy L. Clay, the black godfather of Silicon Valley

Pioneers in Tech: Roy L. Clay, the black godfather of Silicon Valley

The technology chapter of any Black history textbook would have to start with the life story of this week’s “Pioneers in Tech”, Roy L. Clay. After, he has more than earned the moniker the “Black Godfather of Silicon Valley.”

/ February 10, 2023
The real cost of a major email-borne attack

The real cost of a major email-borne attack

A new international study highlights the significant financial cost and disruption caused by an email-based security attack. Three-quarters (75%) of the organizations surveyed for the 2023 Email Trends Report say they have fallen victim to at least one successful email attack in...

/ February 9, 2023 / 9 Comments
Malvertising makes a comeback

Malvertising makes a comeback

Malvertising is nothing new. But often times for hackers, what’s old is new again. “Cybersecurity is like a game of whack-a-mole, you punch one threat down, and it pops up someplace else later,” says Max Jennings, a cybersecurity expert in...

/ February 8, 2023