Results for: Ask an MSP Expert
A matter of life and death
We recently looked at medical device security and how MSPs can work in the market. As the IoT grows to include more and more of peoples’ daily lives, it is becoming more important to place some focus on this topic....
The era of the cloud mafia?
As a third-generation Italian-American growing up in the Midwest, I was used to hearing about the feared Mafia, either in the stories of older relatives or in the misguided attempts at humor by school kids.
Threat hunting could be very good for managed services providers
In their zeal to be seen to be doing more about cybersecurity, vendors are increasingly embedding threat monitoring capabilities within a variety of applications to make it easier to hunt for malware. But even when vendors decide to make threat detection...
Network Management: In Search of a Few Good GUIs
Most of the time, interacting with electronic devices is as simple as point and click. In many instances, you don’t even have to think very hard about where to point, thanks to the richly intuitive tools that have evolved out...
GDPR: Surely everyone has dealt with it by now … right?
The European Union’s General Data Protection Regulation is a regulation in EU law stipulating how organisations must deal with data to ensure that individuals are protected, and that individuals can more easily determine what data an organisation holds about them. It became...
Richard Tubb: Why should you move to the managed services model?
When I started running my own IT business, I was your typical one-man-band. A techie crawling under tables, fixing computers, and setting up servers. I was good at what I did, I was professional, and word soon spread. Before long,...
Salesforce Marketing Cloud enhancements are all about improving customer experience
Salesforce Connections might not be as big as Dreamforce, but it’s meant to give the Salesforce Marketing Cloud its own special time in the sun. The conference took place in Chicago this week and in many ways felt like Adobe...
Threat Spotlight: Advanced polymorphic malware
Imagine having a key that changes shape to fit any lock you might encounter. That’s pretty much what malware creators have at their disposal with advanced polymorphic malware, and it’s a real headache for MSPs tasked with stopping it or,...
5 Tips for working with the press
Before the Internet, blogging, and social media, businesses relied heavily on advertising and public relations to build brand awareness. The joke among marketing leaders to clients was, “You either pray for space or pay for space—or both.” Fast forward from...
Tech Time Warp: The First Ethical Hacker
These days, the concept of an ethical hacker is so commonplace the profession has its own Certified Ethical Hacker designation, bestowed and governed by the International Council of E-Commerce Consultants. The ethical hackers of the world put their genius to...