Category: Featured

Hackers harvest agri-business ransomware

Hackers harvest agri-business ransomware

MSPs with a portfolio of clients that include nondescript agriculture and food processing businesses, often think they are off the radar of sophisticated international hackers. Yet, this is not the case at all.

/ May 13, 2022 / 6 Comments
Pioneers in Tech: Ajay Bhatt, co-inventor of USB technology

Pioneers in Tech: Ajay Bhatt, co-inventor of USB technology

For this week’s Pioneers in Tech, we’re looking into the story of the USB. Like so many now-ubiquitous innovations, USB technology has a fascinating origin story you probably don’t know—and it might make you think twice about the “old” USB...

/ May 13, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Threat actors targeting VoIP provides with DDoS attacks

Cybersecurity Threat Advisory: Threat actors targeting VoIP provides with DDoS attacks

F5 has released a set of vulnerabilities including 17 high and 1 critical which affect the users of BIG-IP application delivery controller. The vulnerabilities provide malicious actors the ability to deploy crypto mining, ransomware, or other malicious files to the...

/ May 11, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: TLStorm 2.0 vulnerabilities

Cybersecurity Threat Advisory: TLStorm 2.0 vulnerabilities

Up to 5 vulnerabilities were uncovered within the use of the TLS protocol in multiple models of the Aruba and Avaya Network switches. These vulnerabilities, if exploited, can provide threat actors remote access to enterprise networks and to transfer confidential...

/ May 11, 2022
Tech Time Warp: The Love Bug Bites

Tech Time Warp: The Love Bug Bites

One might say more than 3 million computer users had a bad date on May 4, 2000. In this week’s edition of Tech Time Warp, we’re going back to the day those users downloaded the ILOVEYOU virus, a Visual Basic...

/ May 6, 2022
Are you portraying yourself as a strategic partner?

Are you portraying yourself as a strategic partner?

Being an MSP has changed markedly over the years. In the early days (going back as far as being an application service provider or ASP), it was a given that most of the business would come from a web search....

/ May 3, 2022
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache CouchDB critical vulnerability

Cybersecurity Threat Advisory: Apache CouchDB critical vulnerability

Apache has released a patch for a critical remote privilege escalation vulnerability in Apache CouchDB 3.2.1 protocol. This vulnerability, if not patched, can allow threat actors to execute code on a targeted server or client without being authenticated. Barracuda MSP...

/ April 29, 2022
Tech Time Warp: The Sasser worm teaches a lesson

Tech Time Warp: The Sasser worm teaches a lesson

In this week’s edition of Tech Time Warp, we’re traveling back to early May 2004, when computer users worldwide learned a hard lesson: Don’t procrastinate when it comes to installing a security patch. Users at the Taiwanese post office, the...

/ April 29, 2022
Webinar: 7 little changes that will make a big difference with your SEO

Webinar: 7 little changes that will make a big difference with your SEO

We are looking forward to sitting down with Raj Khera, Growth Advisor to B2B SaaS companies and Publisher of MoreBusiness.com, as he walks us through some small tweaks that you can implement today to increase your search engine optimization (SEO)....

/ April 21, 2022
Ask an MSP Expert: What is the best way to expand my security service offering? 

Ask an MSP Expert: What is the best way to expand my security service offering? 

Q: We are finding it harder than ever to protect our customers with the security solutions we currently offer. Not only are they generating a lot of alerts, many of which turn out to be false positives once my team...

/ April 18, 2022