Most Discussed Posts

Coronavirus helps spread computer viruses

Coronavirus helps spread computer viruses

Coronavirus has sent a chill through the world economy and has spread fear beyond its origin in the Wuhan province of China. As the virus threatens to become a global pandemic, hackers and cybercriminals are using public apprehension over the...

/ February 27, 2020 / 13 Comments
Spring-cleaning checklist for defending against ransomware

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

/ April 5, 2024 / 12 Comments
Voice cloning – a growing cybersecurity threat

Voice cloning – a growing cybersecurity threat

Just when you think you’re reasonably on top of all the cyberthreats out there, new ones emerge. Say hello to voice cloning. Or don’t say hello to it because you don’t want a scammer to have your voice. Voice cloning made...

/ May 10, 2023 / 12 Comments
Remote work cybersecurity: Choosing between VPN and ZTNA

Remote work cybersecurity: Choosing between VPN and ZTNA

With many businesses accepting remote and hybrid work models, businesses are now looking to MSPs to evaluate the long-term sustainability of their existing cybersecurity infrastructure to ensure their businesses are protected. For many, this means turning from existing cybersecurity protections...

/ July 5, 2021 / 12 Comments
Ask an MSP Expert: What is conversation hijacking and how can I protect against it?

Ask an MSP Expert: What is conversation hijacking and how can I protect against it?

Q: Lately we have heard a lot about emerging conversation hijacking threats. What does conversation hijacking entail and how can my MSP business prevent it from negatively affecting our customers? Hackers and other bad actors are always inventing new methods...

/ March 30, 2020 / 12 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Supply chain attack compromised 3CXDesktopApp

Cybersecurity Threat Advisory: Supply chain attack compromised 3CXDesktopApp

A recent compromise has caused trojanized versions of the 3CXDesktopApp executable to be distributed on 3CX’s website as well as pushed through updates. The malicious version of the 3CX application is used to sideload malicious .DLL files. These .DLL files...

/ March 30, 2023 / 11 Comments
Why is lead generation for MSPs challenging?

Why is lead generation for MSPs challenging?

“We had a marketing vendor for six months and we didn’t get a single qualified lead!” “We hired a sales guy, but he didn’t last long.” “Our PPC gets leads but most are just emergency buyers.” MSPs are understandably frustrated...

/ May 2, 2022 / 11 Comments
Q&A: An MSP’s perspective of the evolving managed services landscape

Q&A: An MSP’s perspective of the evolving managed services landscape

As Global MSP Day (held on May 21st) approaches, Smarter MSP is celebrating what it means to be a managed service provider in 2020 by sitting down with your MSP peers to get their feedback on the state of the...

/ April 30, 2020 / 11 Comments
managed services model
Richard Tubb: Why should you move to the managed services model?

Richard Tubb: Why should you move to the managed services model?

When I started running my own IT business, I was your typical one-man-band. A techie crawling under tables, fixing computers, and setting up servers. I was good at what I did, I was professional, and word soon spread. Before long,...

/ June 28, 2018 / 11 Comments
Ask an MSP Expert: Offering comprehensive Microsoft 365 protection 

Ask an MSP Expert: Offering comprehensive Microsoft 365 protection 

It’s estimated that Microsoft 365 is used by over one million companies globally. This widespread adoption is led by more than just the Microsoft name. Its ease of use, seamless integrations and collaboration capabilities, streamlined IT management, and built-in security features...

/ April 30, 2024 / 10 Comments