Most Discussed Posts

Voice cloning – a growing cybersecurity threat

Voice cloning – a growing cybersecurity threat

Just when you think you’re reasonably on top of all the cyberthreats out there, new ones emerge. Say hello to voice cloning. Or don’t say hello to it because you don’t want a scammer to have your voice. Voice cloning made...

/ May 10, 2023 / 12 Comments
Remote work cybersecurity: Choosing between VPN and ZTNA

Remote work cybersecurity: Choosing between VPN and ZTNA

With many businesses accepting remote and hybrid work models, businesses are now looking to MSPs to evaluate the long-term sustainability of their existing cybersecurity infrastructure to ensure their businesses are protected. For many, this means turning from existing cybersecurity protections...

/ July 5, 2021 / 12 Comments
Ask an MSP Expert: What is conversation hijacking and how can I protect against it?

Ask an MSP Expert: What is conversation hijacking and how can I protect against it?

Q: Lately we have heard a lot about emerging conversation hijacking threats. What does conversation hijacking entail and how can my MSP business prevent it from negatively affecting our customers? Hackers and other bad actors are always inventing new methods...

/ March 30, 2020 / 12 Comments
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Supply chain attack compromised 3CXDesktopApp

Cybersecurity Threat Advisory: Supply chain attack compromised 3CXDesktopApp

A recent compromise has caused trojanized versions of the 3CXDesktopApp executable to be distributed on 3CX’s website as well as pushed through updates. The malicious version of the 3CX application is used to sideload malicious .DLL files. These .DLL files...

/ March 30, 2023 / 11 Comments
Why is lead generation for MSPs challenging?

Why is lead generation for MSPs challenging?

“We had a marketing vendor for six months and we didn’t get a single qualified lead!” “We hired a sales guy, but he didn’t last long.” “Our PPC gets leads but most are just emergency buyers.” MSPs are understandably frustrated...

/ May 2, 2022 / 11 Comments
managed services model
Richard Tubb: Why should you move to the managed services model?

Richard Tubb: Why should you move to the managed services model?

When I started running my own IT business, I was your typical one-man-band. A techie crawling under tables, fixing computers, and setting up servers. I was good at what I did, I was professional, and word soon spread. Before long,...

/ June 28, 2018 / 11 Comments
Spring-cleaning checklist for defending against ransomware

Spring-cleaning checklist for defending against ransomware

Just like your home, your cybersecurity practices could use a spring-cleaning. It’s a great time to “dust off” you and your customers’ devices and data to ensure best practices are followed. Afterall, there is no greater mess than trying to...

/ April 5, 2024 / 10 Comments
Ask an MSP Expert
Ask an MSP Expert: How to excel at public speaking

Ask an MSP Expert: How to excel at public speaking

In this edition of Ask an MSP Expert, we delve into the power of public speaking. Whether you’re addressing a conference, leading a sales presentation, or simply conversing in a team meeting, mastering the art of public speaking can profoundly...

/ March 12, 2024 / 10 Comments
Cyberthreat predictions for 2024 from Barracuda’s security frontline

Cyberthreat predictions for 2024 from Barracuda’s security frontline

Predicting the future is difficult, but you can anticipate what is likely to happen by looking at how things have evolved over the past year. This year again, Barracuda asked colleagues who work on the security frontline, from XDR and offensive...

/ December 14, 2023 / 10 Comments
Get ready for the 6th annual Global MSP Day

Get ready for the 6th annual Global MSP Day

Our favorite time of year is almost here. If you haven’t done so already, it’s time to register for the 6th annual Global MSP Day on June 1st! We initiated Global MSP Day six years ago to recognize MSPs around the world,...

/ May 9, 2023 / 10 Comments