Cybersecurity Threat Advisory: Telecoms targeted with new malware
A China‑linked advanced persistent threat group, UAT‑9244, has been targeting telecommunications (telecom) providers in South America since at least 2024. Learn more about this targeted campaign and how to protect your environment in this Cybersecurity Threat Advisory. What is the...
How MSPs grow email lists using LinkedIn
Key Takeaways Treat LinkedIn as the top of a list-building strategy, not the destination. Offer practical resources MSP buyers care about to earn email opt-ins. Use a Pillar–Cluster–Dot–FAQ framework to turn one topic into ongoing LinkedIn engagement. Most IT providers...
The talent strategy behind the most profitable IT service providers
A global survey of IT services providers finds that the most profitable organizations tend to spend less on payroll by relying more heavily on junior staff to fulfill clearly defined roles. Conducted by Service Leadership, the survey also reveals that the...
Why information security matters more than ever
It’s all in the information. The first recorded patent was issued to Filippo Brunelleschi in Florence in 1421, covering his invention of a barge and crane used to transport marble. Shortly afterward in 1449, John of Utynam was issued a...
Sales & Marketing
What is AI search and why should MSPs care?
Key takeaways AI search generates direct answers instead of listing links. MSP visibility now depends on being summarized and cited, not just ranked. AI search builds on SEO but prioritizes clarity, structure, and consistency. MSP leaders who refine positioning and...
The truth about AI search optimization for MSPs (and no, SEO is not dead)
If you’ve spent any time around MSP marketing conversations lately, it probably feels like the rules of visibility are changing every other week. SEO is dead. AI search is taking over. You need AEO. GEO. EEAT. Whatever the acronym of...
How MSPs build digital credibility and get found in AI search: 7 strategies
Key takeaways Your prospects use AI to research and vet IT providers Highlight certifications and partnerships Keep messaging consistent across every channel Do buyers know you exist? AI search is delivering the rep-free experience 75 percent of buyers told Gartner...
Security
Making the case for a layered email security approach
MSPs have a lot of ground to cover with their clients. In addition to providing protection, there’s also persuasion. Many MSPs find themselves needing to justify additional cybersecurity investments at a time when budgets are under scrutiny—and that can make...
Cybersecurity Threat Advisory: Apple security updates for iOS vulnerabilities
Apple has released urgent security updates for older iPhones and iPads to address multiple vulnerabilities actively exploited in the wild via the Coruna exploit kit—a sophisticated attack framework used by both espionage groups and cybercriminals. Read this Cybersecurity Threat Advisory...
Cybersecurity Threat Advisory: PureLog Stealer malware campaign
A new malware campaign is using deceptive copyright infringement notices to distribute PureLog Stealer, targeting organizations across multiple sectors and countries. The malware operates primarily in memory and employs evasion techniques such as DLL sideloading to bypass traditional security controls....
Better Business
Beyond recovery: The new resilience mindset
A global survey of 1,000 business and IT decision‑makers and senior developers shows that while organizations feel more resilient than they were a year ago, many still struggle with the cost of recovery and remediation when a real IT incident...
Survey shows channel partners are seeking more vendor support
A survey of 400 technology channel partners suggests that the level of support they expect from IT vendors is shifting in an era marked by rapid innovation and economic uncertainty. Rising expectations for vendor support Conducted by the Futurum Group,...
There’s an elephant in the room—and it drinks data
Many MSPs depend heavily on third‑party cloud providers. For organizations that see themselves aligned with the West, the preferred platforms are typically AWS, Azure, or Google Cloud. They often avoid Alibaba Cloud or Tencent Cloud because they fear data loss...
Tech Insight
Tech Time Warp: A salute to the floppy disk, the foundation of “sneakernet”
The denizens of Gen Z and Gen Alpha may have never used floppy disks, and they may have never given much thought to what the “Save” icon represents. And, like the giant cell phones of the 1990s, the floppy disk...
Tech Time Warp: FBI releases its first warning about a computer virus
Twenty-six years ago, on March 28, 1999, the FBI took a historic step: Its National Infrastructure Protection Center (NIPC) issued its first warning about a computer virus. The NIPC had “received reports of significant network degradation and email outages,” and...
Pioneers in Tech: Joan Clarke, Bletchley Park codebreaker
The stories of the women of Bletchley Park—the secret British codebreaking facility during World War II—are only now becoming known, much like those of the “hidden figures” of NASA. How women helped break the unbreakable Thousands of women worked at...
