Category: Featured

Malvertising makes a comeback
Malvertising is nothing new. But often times for hackers, what’s old is new again. “Cybersecurity is like a game of whack-a-mole, you punch one threat down, and it pops up someplace else later,” says Max Jennings, a cybersecurity expert in...

Cybersecurity Threat Advisory: OneNote malware delivery
Multiple threat actors are now using OneNote documents to deliver malware. In the last month alone, over 50 OneNote campaigns delivering different malware payloads through email attachments have been observed.

Cybersecurity tops IT spending priority list for 2023
A survey of 837 IT leaders and 201 line of business (LOB) executives conducted by the market research form Foundry, a unit of International Data Group (IDG), finds 91 percent of CIOs expect their technology budgets to either increase or...

Cybersecurity Threat Advisory: Atlassian critical remote code execution vulnerability
A critical remote code execution vulnerability has been discovered in the Jira Service Management Server and Data Center owned by Atlassian, tracked as CVE-2023-22501. This vulnerability could allow an unauthenticated attacker to impersonate other users and gain remote access to...

Tech Time Warp: The first published reference to “vaporware”
We all know people who are long on ideas and short on execution. In the software world, one might say these people create “vaporware.” Let’s get into this week’s Tech Time Warp. This term was first used in a Feb....

Preparation is key to defend against cybersecurity catastrophes
MSPs are usually involved in the daily grind of warding off cybercriminals who resort to phishing attempts or DDoS attacks, but what if something much more sinister was lurking out there? According to the World Economic Forum’s Global Cybersecurity Outlook...

Tech Time Warp: Blackworm Offers Rare Chance to Analyze Spread of a Virus
In late January 2006, stopping the worm known as Blackworm (aka Nyxem, MyWife, Blackmal and, interestingly, Kama Sutra) was at the top of most network administrators’ to-do lists.

MSPs should align messaging to the evolving workplace
The Great Resignation. The Great Redundancy. Quiet Quitting. Fake Remote Working. All the above show how the workplace is evolving – people quitting jobs that they no longer enjoy; being let go by employers attempting to rein in costs; avoiding...

The must-have MSP collateral – the buyer’s guide
In the age of content marketing, it’s easy for MSPs to lose sight of the marketing aspect of landing new clients, and instead fall into the trap of merely generating more and more content for the sake of creating content....

Do you have a global perspective on cybersecurity?
Cybersecurity and cybercriminals do not recognize international boundaries, so even the smallest MSPs must always keep a global perspective. What is currently happening in France or Japan may soon be coming to one of your clients in Florida or Kansas....