Results for: tech time warp

Tip Tuesday
Tip Tuesday: How to train your team to work alongside AI

Tip Tuesday: How to train your team to work alongside AI

Artificial intelligence (AI) is rapidly becoming more readily available and beginning to change many processes. The progress has caused many managed service providers (MSPs) to explore how their teams could use the technology to improve workflows. If you’re considering that...

/ January 23, 2024
Tip Tuesday
Tip Tuesday: Minimize shadow IT risks through communication

Tip Tuesday: Minimize shadow IT risks through communication

Although shadow IT (any IT resource used by employees or end users without the IT department’s approval or oversight) practices come with a laundry list of risks, people often insist on using them. In this edition of Tip Tuesday, we’ll...

/ November 21, 2023
Tip Tuesday
Tip Tuesday: How to integrate full-service cybersecurity

Tip Tuesday: How to integrate full-service cybersecurity

October is National Cybersecurity Awareness Month in the United States. That makes it a fantastic time to strongly consider offering full-service cybersecurity as part of your managed service provider (MSP) stack. That decision can boost your revenue and show clients...

/ October 17, 2023
security
From Basics to Breakthroughs: Evolution of IT security in the 1980s

From Basics to Breakthroughs: Evolution of IT security in the 1980s

As part of our 5-part series on the evolution of cybersecurity, check out our first article below that covers how War Games and Worms led to the creation of the first cybersecurity efforts in the 1980s. While cybersecurity is a multibillion-dollar...

/ September 28, 2023
Tip Tuesday
Tip Tuesday: Lead generation for MSP marketing

Tip Tuesday: Lead generation for MSP marketing

This month’s Tip Tuesday dives into how many managed service provider (MSP) businesses need help attracting leads. Instead, they tailor their marketing strategy to focus on something else. While this might help companies in the beginning phases and even attract...

/ September 19, 2023
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: OneNote malware delivery

Cybersecurity Threat Advisory: OneNote malware delivery

Multiple threat actors are now using OneNote documents to deliver malware. In the last month alone, over 50 OneNote campaigns delivering different malware payloads through email attachments have been observed.

/ February 7, 2023
The Creeper and the Reaper make cybersecurity history

The Creeper and the Reaper make cybersecurity history

“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

/ October 16, 2020
Java cloud migration
Java cloud migration starting to accelerate

Java cloud migration starting to accelerate

Managed service providers can gain insight into the rate at which production applications are moving into the cloud from a survey of 1,800 developers published today by The Eclipse Foundation. The survey finds that half the respondents are running less...

/ April 24, 2018
ransomware protection
The never-ending battle against ransomware

The never-ending battle against ransomware

Ransomware has largely faded from the headlines since WannaCry and NotPetya wreaked havoc across the globe in 2017. In some ways, ransomware creators were victims of their own success. The attacks garnered so much attention that, as Malwarebytes’ Chris Boyd told...

/ February 27, 2018 / 1 Comment
advanced threats
Threat Watch: Resume Files containing Advanced Persistent Threats

Threat Watch: Resume Files containing Advanced Persistent Threats

As cybercriminals become more duplicitous by the day, businesses and individuals alike need to be more aware than ever of their digital surroundings. One example of this was recently highlighted on the Barracuda blog: Resume files containing Advanced Persistent Threats...

/ March 14, 2017