Results for: ask an expert

polymorphic malware
Threat Spotlight: Advanced polymorphic malware

Threat Spotlight: Advanced polymorphic malware

Imagine having a key that changes shape to fit any lock you might encounter. That’s pretty much what malware creators have at their disposal with advanced polymorphic malware, and it’s a real headache for MSPs tasked with stopping it or,...

/ June 13, 2018 / 2 Comments
5 Tips for working with the press

5 Tips for working with the press

Before the Internet, blogging, and social media, businesses relied heavily on advertising and public relations to build brand awareness. The joke among marketing leaders to clients was, “You either pray for space or pay for space—or both.” Fast forward from...

/ June 11, 2018
digital business transformation
Digital business transformation creates data management opportunities for MSPs

Digital business transformation creates data management opportunities for MSPs

A lot of hype has been generated about the need to turn data into a strategic business asset as part of a digital business transformation. But, it turns out that the biggest impediment to realizing that vision is reliance on...

/ May 22, 2018
break-fix model
Alex Hoff: How to break away from the break-fix model that’s killing your MSP business

Alex Hoff: How to break away from the break-fix model that’s killing your MSP business

If it ain’t broke, don’t fix it. Isn’t that what people always say? But when it comes to providing network and IT support, it’s an approach that could be killing your business. IT infrastructure isn’t something you buy once and...

/ May 14, 2018
Hollerith tabulator
Tech Time Warp: The First Ethical Hacker

Tech Time Warp: The First Ethical Hacker

These days, the concept of an ethical hacker is so commonplace the profession has its own Certified Ethical Hacker designation, bestowed and governed by the International Council of E-Commerce Consultants. The ethical hackers of the world put their genius to...

/ May 11, 2018
school IT security
MSPs have to outsmart wily students

MSPs have to outsmart wily students

There was a time when a teacher using an overhead projector was considered high-tech, but now smartboards, student tablets, smartphones, laptops, and campus-wide networks have turned schools into hubs of connectivity that are often too much for an in-house staff...

/ May 9, 2018
Spam email
Tech Time Warp: Spam email celebrates its 40th birthday

Tech Time Warp: Spam email celebrates its 40th birthday

As you work long hours to ensure your company complies with GDPR by May 25, it’s worth noting that proper use—or misuse—of data has been an issue for at least 40 years. Just ask Gary Thuerk, the self-described “father of...

/ May 4, 2018
Artificial intelligence cyber warfare
Weaponizing artificial intelligence

Weaponizing artificial intelligence

Fending off ransomware and other malware attacks has already become part of the daily MSP landscape. But in the ever-evolving world of threats, a new one will begin to emerge with greater frequency in the months and years ahead: weaponized...

/ May 3, 2018
MSP obstacles
8 Common MSP stumbling blocks to watch out for

8 Common MSP stumbling blocks to watch out for

Every IT service business is a work in progress, whether you’re a new MSP just getting started, a VAR transitioning to an MSP model, or a veteran IT service provider. At any given moment, you can probably think of a...

/ May 2, 2018
Sasser worm
Tech Time Warp: The Sasser worm teaches a lesson

Tech Time Warp: The Sasser worm teaches a lesson

In early May 2004, computer users worldwide learned a hard lesson: Don’t procrastinate when it comes to installing a security patch. Users at the Taiwanese post office, the train station in Sydney, and some of Wall Street’s biggest banks found...

/ April 27, 2018