Most Discussed Posts

Coronavirus helps spread computer viruses
Coronavirus has sent a chill through the world economy and has spread fear beyond its origin in the Wuhan province of China. As the virus threatens to become a global pandemic, hackers and cybercriminals are using public apprehension over the...

Spring-cleaning checklist for defending against ransomware
Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

Voice cloning – a growing cybersecurity threat
Just when you think you’re reasonably on top of all the cyberthreats out there, new ones emerge. Say hello to voice cloning. Or don’t say hello to it because you don’t want a scammer to have your voice. Voice cloning made...

Remote work cybersecurity: Choosing between VPN and ZTNA
With many businesses accepting remote and hybrid work models, businesses are now looking to MSPs to evaluate the long-term sustainability of their existing cybersecurity infrastructure to ensure their businesses are protected. For many, this means turning from existing cybersecurity protections...

Ask an MSP Expert: What is conversation hijacking and how can I protect against it?
Q: Lately we have heard a lot about emerging conversation hijacking threats. What does conversation hijacking entail and how can my MSP business prevent it from negatively affecting our customers? Hackers and other bad actors are always inventing new methods...

Cybersecurity Threat Advisory: Supply chain attack compromised 3CXDesktopApp
A recent compromise has caused trojanized versions of the 3CXDesktopApp executable to be distributed on 3CX’s website as well as pushed through updates. The malicious version of the 3CX application is used to sideload malicious .DLL files. These .DLL files...

Why is lead generation for MSPs challenging?
“We had a marketing vendor for six months and we didn’t get a single qualified lead!” “We hired a sales guy, but he didn’t last long.” “Our PPC gets leads but most are just emergency buyers.” MSPs are understandably frustrated...

Q&A: An MSP’s perspective of the evolving managed services landscape
As Global MSP Day (held on May 21st) approaches, Smarter MSP is celebrating what it means to be a managed service provider in 2020 by sitting down with your MSP peers to get their feedback on the state of the...

Richard Tubb: Why should you move to the managed services model?
When I started running my own IT business, I was your typical one-man-band. A techie crawling under tables, fixing computers, and setting up servers. I was good at what I did, I was professional, and word soon spread. Before long,...