Category: Featured

MSPs and election cybersecurity

MSPs and election cybersecurity

MSPs have emerged as central players in the democracy machinery. And after a rash of recent attacks on MSPs, some worry that MSPs may face a new challenge in election cybersecurity for the United States’ upcoming Presidential elections. Tim Davis,...

/ October 19, 2020
Email threat types: Data exfiltration

Email threat types: Data exfiltration

Data exfiltration, sometimes referred to as data theft, is the unauthorized transfer of data from your computer, network, or other devices. The stolen data is transferred from the victim to a control server or some other device that is controlled...

/ October 19, 2020
The Creeper and the Reaper make cybersecurity history

The Creeper and the Reaper make cybersecurity history

“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

/ October 16, 2020
Ask an MSP Expert: Overcoming human error to secure the cloud

Ask an MSP Expert: Overcoming human error to secure the cloud

Data breaches in the cloud are becoming more common, impacting industry giants and small players alike, and MSPs now have to dig deeper to prevent them.

/ October 12, 2020
Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”

Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”

Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...

/ October 9, 2020
Tech Time Warp: National Cybersecurity Awareness Month turns 17

Tech Time Warp: National Cybersecurity Awareness Month turns 17

For the past 17 years, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) have used the month of October to educate Americans about the importance of good cybersecurity habits. Much has changed since the...

/ October 2, 2020
Tech Time Warp: CompuServe brings online access to consumers

Tech Time Warp: CompuServe brings online access to consumers

“Last night we … had a party for 11 people in nine different states and only had to wash one glass.” This isn’t a description of a Zoom happy hour. It’s the tagline of a 1983 magazine ad for CompuServe,...

/ September 25, 2020
Tech Time Warp: WebTV, your smart TV’s ancestor

Tech Time Warp: WebTV, your smart TV’s ancestor

Most of us have relied on streaming services to stay semi-sane during COVID-19 shutdowns. Did you know your smart TV has its roots in WebTV, a product that was truly ahead of its time (and its available bandwidth)?

/ September 18, 2020
Finding new ways to deal with inevitable tech disasters

Finding new ways to deal with inevitable tech disasters

The one thing for certain is that when it comes to technology, there will come a time when disaster will strike, and as your client’s IT shop, it’s going to be up to you to fix it. You must have...

/ September 14, 2020
Pioneers in Tech: Radia Perlman and the Spanning Tree Algorithm

Pioneers in Tech: Radia Perlman and the Spanning Tree Algorithm

You may not have heard of the “Spanning Tree Algorithm,” but it’s the backbone of the Ethernet technology we enjoy and rely upon today. The algorithm, also known as the “Spanning Tree Protocol” or STP, was the brainchild of Radia...

/ September 11, 2020 / 3 Comments