AI
The dark side of generative AI: Unveiling the AI threat landscape

The dark side of generative AI: Unveiling the AI threat landscape

Generative artificial intelligence (Gen AI) has unleashed a new threat landscape for cybercrime. Threat actors now weaponize large language models (LLMs), which once served primarily legitimate purposes. Underground forums and dark web marketplaces are buzzing with “dark LLMs” — custom...

/ August 25, 2025 / 4 Comments
AI tools
AI tools spark surge in security service needs

AI tools spark surge in security service needs

The rapid spread of generative artificial intelligence (Gen AI) tools has reached a tipping point, raising serious cybersecurity concerns, and creating opportunities for managed service providers (MSPs). A survey of 200 North American security leaders conducted by OpinionRoute on behalf...

/ August 21, 2025
MSPs: Never start with technology when selling your managed services

MSPs: Never start with technology when selling your managed services

As someone who has spent hundreds of thousands of dollars on sales coaching while growing my own business into one of the fastest-growing marketing companies for managed service providers (MSPs), it’s fair to say that I’ve paid my dues as...

/ August 20, 2025
Tip Tuesday
Tip Tuesday: Crafting a BCDR policy that actually works for hybrid environments

Tip Tuesday: Crafting a BCDR policy that actually works for hybrid environments

A business continuity and disaster recovery (BCDR) policy is essential for protecting client environments from disruptive events. Traditional BCDR plans explain how to recover critical functions and restore data, but they often stop short of addressing the full complexity of...

/ August 19, 2025

Sales & Marketing

Ask an MSP Expert: How AI can help you personalize outreach and repurpose content

Ask an MSP Expert: How AI can help you personalize outreach and repurpose content

Artificial intelligence (AI) excels at spotting patterns and automating workflows, but what about the messy, one-off challenges that arise in real sales conversations? This is where skepticism can creep in. However, with the right approach, AI can still serve as...

/ July 16, 2025
sales team
Is your sales team losing deals they should win?

Is your sales team losing deals they should win?

You’re trying to grow, and it feels like the sales team should be helping you get there. But too often, they’re chasing the wrong leads, following up inconsistently, or losing deals that should have been won. Add to that many...

/ July 9, 2025
cold outreach
How MSPs can fuel faster growth with AI + cold outreach

How MSPs can fuel faster growth with AI + cold outreach

Dave leads a B2B services firm with a dedicated sales team of three. Over the past year, they’ve invested time and resources into cold outreach, hiring sales reps, and launching marketing campaigns. Despite these efforts, the results have been underwhelming,...

/ June 11, 2025
Read more Sales & Marketing posts »

Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Citrix patches NetScaler flaws

Cybersecurity Threat Advisory: Citrix patches NetScaler flaws

Citrix has issued patches for three zero-day vulnerabilities affecting NetScaler ADC and Gateway, including one that attackers have already begun exploiting. Review the details in this Cybersecurity Threat Advisory to reduce your risk from these threats. What is the threat?...

/ August 28, 2025
Cyberthreats
Back to school, back to scams

Back to school, back to scams

As August fades into September, certain sights and sounds return like clockwork: bright yellow school buses rumbling down the roads, playgrounds echoing with the squeals of energetic children, and the slow shift of the seasons. As schools ease into their...

/ August 26, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Critical SAP NetWeaver vulnerabilities

Cybersecurity Threat Advisory: Critical SAP NetWeaver vulnerabilities

Researchers have uncovered a chained vulnerability in SAP NetWeaver Visual Composer involving authentication bypass and insecure deserialization. These critical flaws—tracked as CVE-2025-31324 and CVE-2025-42999—are currently being exploited in an active threat campaign targeting exposed Visual Composer servers. Review the details...

/ August 20, 2025
Read more Security posts »

Better Business

Data center
Data center drought: MSPs scramble for capacity

Data center drought: MSPs scramble for capacity

In the months and years ahead, many IT leaders will urgently turn to managed service providers (MSPs) to help them find IT infrastructure resources to run their workloads. An analysis of the data center colocation market was published by JLL,...

/ August 28, 2025
Churn isn’t just a number — it’s a warning sign MSPs can’t ignore

Churn isn’t just a number — it’s a warning sign MSPs can’t ignore

Let’s get straight to the point: what’s your rate of customer churn? Are you happy with it? Keep in mind that the cost of replacing every lost customer is much higher than just keeping them in the first place.  When...

/ August 27, 2025
CIRCIA
CIRCIA compliance: What MSPs need to know now

CIRCIA compliance: What MSPs need to know now

The full implementation of the Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) is rapidly approaching, bringing with it a new package of rules and regulations that managed service providers (MSPs) must follow, at least those serving critical infrastructure clients....

/ August 19, 2025
Read more Better Business posts »

Tech Insight

Tech Time Warp
Tech Time Warp: The lovable and luggable Compaq Portable

Tech Time Warp: The lovable and luggable Compaq Portable

August 27 marked the 32nd anniversary of the release of the Compaq Presario. This was a family of PCs that included a monitor, a modem, and, for many, their first America Online CD-ROM. Learn more in this edition of Tech...

/ August 29, 2025
Tech Time Warp
Tech Time Warp: The history of the Computer History Museum

Tech Time Warp: The history of the Computer History Museum

It might seem a bit meta (not Meta!) for a technology history blog series to cover the history of the Computer History Museum, but the Silicon Valley institution is the mothership, and we certainly rely on its incredible web presence....

/ August 22, 2025
Tech Time Warp
Tech Time Warp: Welchia—when the remedy was as bad as the malady

Tech Time Warp: Welchia—when the remedy was as bad as the malady

August 2003 was already challenging for network administrators. They were busy fending off the Blaster worm, whose payload caused computers to reboot every 60 seconds, so initially they may have reacted positively to news of the Welkin worm. Welkin was...

/ August 15, 2025
Read more Tech Insight posts »