Most Discussed Posts

Ask an MSP Expert: How do I make sure my Office 365 data is safe?
Q: We have clients who run almost their entire business on Office 365. However, most of them decline additional security services because they think that “Microsoft has my back,” but how true is that? To answer this question, Smarter MSP...

You can experiment with blockchain development tools for free
You might easily have missed it this week, when Kadena, a Brooklyn, New York startup, announced a free private Blockchain as a Service tool in the Azure Marketplace, but it could be more relevant to you than you think. When...

Tech Time Warp: Compaq introduces the Presario and dominates the PC market
If you owned a home computer in the 1990’s, chances are it was a Compaq Presario. Today, the name Compaq might incite nostalgia, but during the 1980’s and 1990’s, Compaq dominated the personal computer market. Compaq was one of the...

How DevOps savvy is your organization?
The term DevOps has been bandied about for several years now, and while its meaning is open to debate, it’s basically a set of principles that help establish roles for developers and IT to build software in a continuous delivery...

VMware Cloud on AWS momentum starts to swell
Following a few early VMware missteps, it would appear that cloud momentum surrounding VMware, on the eve of the annual VMworld conference next week, is finally starting to increase. A survey of 1,156 IT and business professionals published today by...

5 steps to adopting a cloud services model
Cloud computing has transformed the way companies do business. It’s no longer a solution for just enterprises, as it’s expected to exceed $270 billion by 2020 and 44 percent of the growth will come from small businesses. And it’s anticipated...

How RPA can help drive automation in legacy businesses
Increasingly, companies are looking for ways to automate repetitive internal processes, but most can’t simply rip and replace the systems that they have in place and go for the latest and greatest AI technologies. It’s simply too risky, disruptive, and...

Supply chain attacks on the rise
You’ve turned your client’s network into a virtual fortress. There are firewalls, double authentication protocols, an up-to-date patching regimen, and frequent pen-testing. You’ve pretty much eliminated the threat of hackers within your client’s critical network, right? Think again.

Your next hack could arrive by snail mail
When you think about getting hacked, you probably imagine hackers using stolen credentials, undertaking a phishing attack, or exploiting a vulnerability in your network. What you probably don’t expect is for them to come through the front door, and access...

Tech Time Warp: Was the Welchia Worm well-intended?
As the old saying goes, two wrongs don’t make a right — especially if the second “wrong” is a computer worm, albeit a benevolent one. In August 2003, hundreds of thousands of PCs were infected by the Blaster worm, which...