Category: Featured

Malvertising makes a comeback

Malvertising makes a comeback

Malvertising is nothing new. But often times for hackers, what’s old is new again. “Cybersecurity is like a game of whack-a-mole, you punch one threat down, and it pops up someplace else later,” says Max Jennings, a cybersecurity expert in...

/ February 8, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: OneNote malware delivery

Cybersecurity Threat Advisory: OneNote malware delivery

Multiple threat actors are now using OneNote documents to deliver malware. In the last month alone, over 50 OneNote campaigns delivering different malware payloads through email attachments have been observed.

/ February 7, 2023
Cybersecurity tops IT spending priority list for 2023

Cybersecurity tops IT spending priority list for 2023

A survey of 837 IT leaders and 201 line of business (LOB) executives conducted by the market research form Foundry, a unit of International Data Group (IDG), finds 91 percent of CIOs expect their technology budgets to either increase or...

/ February 6, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Atlassian critical remote code execution vulnerability

Cybersecurity Threat Advisory: Atlassian critical remote code execution vulnerability

A critical remote code execution vulnerability has been discovered in the Jira Service Management Server and Data Center owned by Atlassian, tracked as CVE-2023-22501. This vulnerability could allow an unauthenticated attacker to impersonate other users and gain remote access to...

/ February 3, 2023
Tech Time Warp: The first published reference to “vaporware”

Tech Time Warp: The first published reference to “vaporware”

We all know people who are long on ideas and short on execution. In the software world, one might say these people create “vaporware.” Let’s get into this week’s Tech Time Warp. This term was first used in a Feb....

/ February 3, 2023
Preparation is key to defend against cybersecurity catastrophes

Preparation is key to defend against cybersecurity catastrophes

MSPs are usually involved in the daily grind of warding off cybercriminals who resort to phishing attempts or DDoS attacks, but what if something much more sinister was lurking out there? According to the World Economic Forum’s Global Cybersecurity Outlook...

/ January 31, 2023
Computer Virus
Tech Time Warp: Blackworm Offers Rare Chance to Analyze Spread of a Virus

Tech Time Warp: Blackworm Offers Rare Chance to Analyze Spread of a Virus

In late January 2006, stopping the worm known as Blackworm (aka Nyxem, MyWife, Blackmal and, interestingly, Kama Sutra) was at the top of most network administrators’ to-do lists.

/ January 27, 2023
MSPs should align messaging to the evolving workplace

MSPs should align messaging to the evolving workplace

The Great Resignation. The Great Redundancy. Quiet Quitting. Fake Remote Working. All the above show how the workplace is evolving – people quitting jobs that they no longer enjoy; being let go by employers attempting to rein in costs; avoiding...

/ January 27, 2023
The must-have MSP collateral – the buyer’s guide

The must-have MSP collateral – the buyer’s guide

In the age of content marketing, it’s easy for MSPs to lose sight of the marketing aspect of landing new clients, and instead fall into the trap of merely generating more and more content for the sake of creating content....

/ January 25, 2023
Do you have a global perspective on cybersecurity?

Do you have a global perspective on cybersecurity?

Cybersecurity and cybercriminals do not recognize international boundaries, so even the smallest MSPs must always keep a global perspective. What is currently happening in France or Japan may soon be coming to one of your clients in Florida or Kansas....

/ January 24, 2023