Category: Featured
2022 Cybersecurity Outlook: Stealth breaches, remote work, and human error
As 2021 comes to a close, Smarter MSP is talking with some of the best and brightest cybersecurity minds to take stock of the past year and get a sense of what to expect in terms of a cybersecurity outlook...
Tech Time Warp: Linux.Darlloz attacks the Internet of Things
What’s on your holiday shopping list this year? Fitness trackers? Smart home hubs? Maybe even a smart coffee mug? No matter how enchanting or convenient a smart device might seem, it never pays to be uninformed about the security risk...
Cybersecurity Threat Advisory: Critical Java Zero-Day Vulnerability
A critical remote code vulnerability has emerged in Log4j, a Java Logging package that is used in a number of software products and platforms from organizations like Apache, Apple, Twitter, Tesla and Steam. This vulnerability impacts almost every Java application...
Pioneers in Tech: Evelyn Boyd Granville, Another Hidden Figure
Although not featured in the popular film, mathematician Evelyn Boyd Granville surely deserves acclaim alongside Katherine Johnson and the other “Hidden Figures” we’ve celebrated in previous installments of Pioneers in Tech. Granville was the second African American woman to earn...
MSPs Need to Provide a Better Digital Experience to End Users
A global survey of 1,000 digital workers and 500 senior IT decision-makers published this week confirms what many managed service providers (MSPs) already know all too well. End users are often their own worst enemies.
‘Tis the Season: Four Cybersecurity Predictions for MSPs
Cybersecurity is like ice cream or fashion, flavors and fads come and go, but the basics remain the same. 2021 brought a wave of ransomware and a realization that remote work is likely here to stay. Smarter MSP recently chatted...
Cybersecurity Threat Advisory: Cyber Threats Targeting Consumers During Holiday Season
The holiday season is once again upon us, and with it comes the busiest time of the year for shopping and traveling. Specifically, from late November to early January of the new year is a time where attackers will be...
Tech Time Warp: The Marconi Wireless Hack of 1903
Technology history is filled with the stories of ethical hackers, as well as the intellectually curious seeking to prove a point. (See the stories of punch card expert René Carmille and the British journalists who hacked into Prince Philip’s inbox.)...
Digital business transformation requires MSPs that get data management
A survey conducted by Pega of 750 senior vice presidents, vice presidents, senior directors, directors, senior managers, and managers of IT finds that 62 percent of respondents have identified data management as the most important competency their organization needs to...