Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Telecoms targeted with new malware

Cybersecurity Threat Advisory: Telecoms targeted with new malware

A China‑linked advanced persistent threat group, UAT‑9244, has been targeting telecommunications (telecom) providers in South America since at least 2024. Learn more about this targeted campaign and how to protect your environment in this Cybersecurity Threat Advisory. What is the...

/ March 26, 2026
How MSPs grow email lists using LinkedIn

How MSPs grow email lists using LinkedIn

Key Takeaways Treat LinkedIn as the top of a list-building strategy, not the destination. Offer practical resources MSP buyers care about to earn email opt-ins. Use a Pillar–Cluster–Dot–FAQ framework to turn one topic into ongoing LinkedIn engagement. Most IT providers...

/ March 25, 2026
The talent strategy behind the most profitable IT service providers

The talent strategy behind the most profitable IT service providers

A global survey of IT services providers finds that the most profitable organizations tend to spend less on payroll by relying more heavily on junior staff to fulfill clearly defined roles. Conducted by Service Leadership, the survey also reveals that the...

/ March 19, 2026
Why information security matters more than ever

Why information security matters more than ever

It’s all in the information. The first recorded patent was issued to Filippo Brunelleschi in Florence in 1421, covering his invention of a barge and crane used to transport marble. Shortly afterward in 1449, John of Utynam was issued a...

/ March 18, 2026

Sales & Marketing

What is AI search and why should MSPs care?

What is AI search and why should MSPs care?

Key takeaways AI search generates direct answers instead of listing links. MSP visibility now depends on being summarized and cited, not just ranked. AI search builds on SEO but prioritizes clarity, structure, and consistency. MSP leaders who refine positioning and...

/ March 11, 2026
The truth about AI search optimization for MSPs (and no, SEO is not dead)

The truth about AI search optimization for MSPs (and no, SEO is not dead)

If you’ve spent any time around MSP marketing conversations lately, it probably feels like the rules of visibility are changing every other week. SEO is dead. AI search is taking over. You need AEO. GEO. EEAT. Whatever the acronym of...

/ March 4, 2026
How MSPs build digital credibility and get found in AI search: 7 strategies

How MSPs build digital credibility and get found in AI search: 7 strategies

Key takeaways Your prospects use AI to research and vet IT providers Highlight certifications and partnerships Keep messaging consistent across every channel Do buyers know you exist? AI search is delivering the rep-free experience 75 percent of buyers told Gartner...

/ February 18, 2026
Read more Sales & Marketing posts »

Security

Making the case for a layered email security approach

Making the case for a layered email security approach

MSPs have a lot of ground to cover with their clients. In addition to providing protection, there’s also persuasion. Many MSPs find themselves needing to justify additional cybersecurity investments at a time when budgets are under scrutiny—and that can make...

/ March 30, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apple security updates for iOS vulnerabilities

Cybersecurity Threat Advisory: Apple security updates for iOS vulnerabilities

Apple has released urgent security updates for older iPhones and iPads to address multiple vulnerabilities actively exploited in the wild via the Coruna exploit kit—a sophisticated attack framework used by both espionage groups and cybercriminals. Read this Cybersecurity Threat Advisory...

/ March 27, 2026
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: PureLog Stealer malware campaign

Cybersecurity Threat Advisory: PureLog Stealer malware campaign

A new malware campaign is using deceptive copyright infringement notices to distribute PureLog Stealer, targeting organizations across multiple sectors and countries. The malware operates primarily in memory and employs evasion techniques such as DLL sideloading to bypass traditional security controls....

/ March 27, 2026
Read more Security posts »

Better Business

Beyond recovery: The new resilience mindset

Beyond recovery: The new resilience mindset

A global survey of 1,000 business and IT decision‑makers and senior developers shows that while organizations feel more resilient than they were a year ago, many still struggle with the cost of recovery and remediation when a real IT incident...

/ March 26, 2026
Survey shows channel partners are seeking more vendor support

Survey shows channel partners are seeking more vendor support

A survey of 400 technology channel partners suggests that the level of support they expect from IT vendors is shifting in an era marked by rapid innovation and economic uncertainty. Rising expectations for vendor support Conducted by the Futurum Group,...

/ March 12, 2026
There’s an elephant in the room—and it drinks data

There’s an elephant in the room—and it drinks data

Many MSPs depend heavily on third‑party cloud providers. For organizations that see themselves aligned with the West, the preferred platforms are typically AWS, Azure, or Google Cloud. They often avoid Alibaba Cloud or Tencent Cloud because they fear data loss...

/ February 25, 2026
Read more Better Business posts »

Tech Insight

Tech Time Warp: A salute to the floppy disk, the foundation of “sneakernet”

Tech Time Warp: A salute to the floppy disk, the foundation of “sneakernet”

The denizens of Gen Z and Gen Alpha may have never used floppy disks, and they may have never given much thought to what the “Save” icon represents. And, like the giant cell phones of the 1990s, the floppy disk...

/ March 27, 2026
Tech Time Warp: FBI releases its first warning about a computer virus

Tech Time Warp: FBI releases its first warning about a computer virus

Twenty-six years ago, on March 28, 1999, the FBI took a historic step: Its National Infrastructure Protection Center (NIPC) issued its first warning about a computer virus. The NIPC had “received reports of significant network degradation and email outages,” and...

/ March 20, 2026
Pioneers in Tech: Joan Clarke, Bletchley Park codebreaker

Pioneers in Tech: Joan Clarke, Bletchley Park codebreaker

The stories of the women of Bletchley Park—the secret British codebreaking facility during World War II—are only now becoming known, much like those of the “hidden figures” of NASA. How women helped break the unbreakable Thousands of women worked at...

/ March 13, 2026
Read more Tech Insight posts »