
Managed services redefined: Expanding beyond IT
A global survey of over 1,240 business leaders from organizations with more than $100 million in revenue suggests that enterprises are increasingly relying on managed service providers (MSPs) to assume responsibility of entire business processes. Conducted by KPMG and HFS...

Security audits play a vital role in defense
Security audits are a crucial component of an organization’s cybersecurity strategy. However, despite their importance, they are not as commonly conducted as you might think. Shift from a reactive to a proactive mindset According to a study, only 52 percent...

The future of MSP marketing: How AI enhances, not replaces, creativity in MSP marketing
Artificial intelligence (AI) is reshaping industries, and managed service provider (MSP) marketing is no exception. As AI-driven tools become increasingly advanced, many marketers wonder how this technology will impact human creativity. The reality? AI isn’t here to replace marketers, especially...
Sales & Marketing

How AI and data are revolutionizing B2B email outreach
Do you know that moment when you hit send on a prospecting email, feeling confident it will start a conversation? And then—nothing. No reply. No engagement. Just radio silence. You’re not alone. MSP reps are feeling it, watching their email...

What over 850 #1 rankings taught us about real MSP SEO
Search Engine Optimization (SEO) is full of noise, and a lot of it is wrong. Managed service providers (MSPs) come to us frustrated and exhausted: spending months chasing 400+ keywords, endlessly tweaking technical settings, and still falling short of competitors...

Navigating AI: The do’s and don’ts for MSPs
There is a big problem when discussing artificial intelligence (AI) with a prospect or customer. With AI, and positioning AI, being a relatively new market with a broad coverage, navigating AI positioning without knowing a person’s level of knowledge can...
Security

Cybersecurity Threat Advisory: Critical Commvault Command Center vulnerability
Commvault Command Center has been impacted by a critical security vulnerability, CVE-2025-34028, with a CVSS score of 10. This vulnerability enables remote code execution (RCE). Review the details of this Cybersecurity Threat Advisory to minimize the risk from this threat....

Cybersecurity Threat Advisory: BYOI endpoint detection and response bypass
A sophisticated attack technique known as “Bring Your Own Installer” (BYOI) has been employed by threat actors to bypass SentinelOne’s tamper protection, facilitating the deployment of Babuk ransomware. This method leverages legitimate installers to execute malicious payloads, effectively evading endpoint...

Cybersecurity incident response plan: An essential MSP practice
Managed service providers (MSPs) are often tasked with providing cybersecurity for their clients. But what happens when a cyberattack happens? Usually, decisions need to be made rapidly and actions taken within minutes. That’s why having incident response plans is critical....
Better Business

Weathering the storm: Partners stay positive
In the face of growing uncertainty, a survey of 705 technology partners in North America and Western Europe finds more than three-quarters (87 percent) expect to grow revenues in 2025, with a subset of that group (18 percent) expecting more...

MSPs: Time to capitalize on the IoT security business opportunity
Managed service providers (MSPs) looking for a rich vein of underutilized market opportunities should examine the business case for delivering IoT security and risk management. So many potential MSP clients already have the traditional bases covered when it comes to...

Maximizing value: MSPs focus on IT cost optimization
In the coming weeks, IT organizations will be turning to managed service providers (MSPs) to help them optimize their existing investments during this period of uncertainty. Historically, when faced with economic challenges, IT organizations have focused on two key areas:...
Tech Insight

Tech Time Warp: A Blaster from the past
Although early conclusions suggest a cyber attack was not the cause of the historic April 28 power outages in Spain, Portugal, and parts of France, only time and the inevitable investigations will tell. The blackout does bring to mind another...

Tech Time Warp: Beware of the nefarious floppy disk
Modern computer users are becoming increasingly aware of the potential cybersecurity risks associated with USB drives. (Whatever you do, don’t get curious about a USB drive you find on the ground!) In this edition of Tech Time Warp learn about how similar...

Tech Time Warp: The women who powered Bletchley Park
Historians and the public widely recognize the contributions of the men at Bletchley Park, especially Alan Turing, who cracked the Germans’ Enigma Code. (So, too, is the tragic end to Turing’s life.) But a sizable female workforce made Bletchley Park’s...