Results for: Ask an MSP Expert

Spam email
Tech Time Warp: Spam email celebrates its 40th birthday

Tech Time Warp: Spam email celebrates its 40th birthday

As you work long hours to ensure your company complies with GDPR by May 25, it’s worth noting that proper use—or misuse—of data has been an issue for at least 40 years. Just ask Gary Thuerk, the self-described “father of...

/ May 4, 2018
Artificial intelligence cyber warfare
Weaponizing artificial intelligence

Weaponizing artificial intelligence

Fending off ransomware and other malware attacks has already become part of the daily MSP landscape. But in the ever-evolving world of threats, a new one will begin to emerge with greater frequency in the months and years ahead: weaponized...

/ May 3, 2018
Sasser worm
Tech Time Warp: The Sasser worm teaches a lesson

Tech Time Warp: The Sasser worm teaches a lesson

In early May 2004, computer users worldwide learned a hard lesson: Don’t procrastinate when it comes to installing a security patch. Users at the Taiwanese post office, the train station in Sydney, and some of Wall Street’s biggest banks found...

/ April 27, 2018
Thought leadership
Carrie Simpson: Thought leadership prospecting the right way

Carrie Simpson: Thought leadership prospecting the right way

Thought leadership prospecting combines personalized interactions with automated marketing touches. It uses carefully curated content and intelligent one-on-one discussions to begin and nurture relationships with qualified prospects. The good news is that you can start thought leadership prospecting using the...

/ April 18, 2018 / 3 Comments
Atlanta ransomware attack
Atlanta ransomware attack highlights IT vulnerabilities of cities

Atlanta ransomware attack highlights IT vulnerabilities of cities

Atlanta, car-clogged highways aside, is the elegant, magnolia-draped metropolis of the South: cosmopolitan, visionary, and Olympic caliber. But, for a few days in March 2018, the daily rhythms of governmental life came to a screeching halt. Water bill payments couldn’t...

/ April 17, 2018
GDPR compliance
Confidence in ability to meet GDPR mandates rides high

Confidence in ability to meet GDPR mandates rides high

Right about now inquiries from customers concerned about their ability to comply with the General Data Protection Rule (GDPR) that is set to implemented by the European Union on May 25 should be skyrocketing. But as is often the case, most...

/ April 17, 2018
intent-based networking
Alex Hoff: The advantages of intent-based networking

Alex Hoff: The advantages of intent-based networking

Intent-based networking makes it possible to manage a network simply by identifying your intent—in other words, what you want to happen. Configure guest Wi-Fi. Set up VoIP phones in Branch 3 office. Software then figures out the best way to...

/ April 16, 2018
cryptojacking
Threat Watch: Cryptojacking

Threat Watch: Cryptojacking

If one of your customers calls or texts you to tell you their system is slow or overheating or gobbling up a lot of power, you need to add a new possible diagnosis to your checklist — cryptojacking. Cryptojacking is...

/ April 5, 2018
sales coach
Brad Stoller: When to drink the Kool-Aid and trust a sales coach

Brad Stoller: When to drink the Kool-Aid and trust a sales coach

The entrepreneurial spirit that drives many business owners imbues them with key advantages. Entrepreneurs are resilient. They are creative. They are willing to separate from the herd and take the path less traveled. This nonconformist mentality is an advantage in...

/ April 4, 2018
wireless charging
Managed wireless charging is coming soon to a table near you

Managed wireless charging is coming soon to a table near you

The days when end users spent some portion of their day trying to find an outlet to power a mobile device are coming to an end. Wireless charging that enables the newest generation of mobile devices to be charged inductively...

/ March 29, 2018 / 1 Comment