Results for: Ask an MSP Expert
Tech Time Warp: Spam email celebrates its 40th birthday
As you work long hours to ensure your company complies with GDPR by May 25, it’s worth noting that proper use—or misuse—of data has been an issue for at least 40 years. Just ask Gary Thuerk, the self-described “father of...
Weaponizing artificial intelligence
Fending off ransomware and other malware attacks has already become part of the daily MSP landscape. But in the ever-evolving world of threats, a new one will begin to emerge with greater frequency in the months and years ahead: weaponized...
Tech Time Warp: The Sasser worm teaches a lesson
In early May 2004, computer users worldwide learned a hard lesson: Don’t procrastinate when it comes to installing a security patch. Users at the Taiwanese post office, the train station in Sydney, and some of Wall Street’s biggest banks found...
Carrie Simpson: Thought leadership prospecting the right way
Thought leadership prospecting combines personalized interactions with automated marketing touches. It uses carefully curated content and intelligent one-on-one discussions to begin and nurture relationships with qualified prospects. The good news is that you can start thought leadership prospecting using the...
Atlanta ransomware attack highlights IT vulnerabilities of cities
Atlanta, car-clogged highways aside, is the elegant, magnolia-draped metropolis of the South: cosmopolitan, visionary, and Olympic caliber. But, for a few days in March 2018, the daily rhythms of governmental life came to a screeching halt. Water bill payments couldn’t...
Confidence in ability to meet GDPR mandates rides high
Right about now inquiries from customers concerned about their ability to comply with the General Data Protection Rule (GDPR) that is set to implemented by the European Union on May 25 should be skyrocketing. But as is often the case, most...
Alex Hoff: The advantages of intent-based networking
Intent-based networking makes it possible to manage a network simply by identifying your intent—in other words, what you want to happen. Configure guest Wi-Fi. Set up VoIP phones in Branch 3 office. Software then figures out the best way to...
Threat Watch: Cryptojacking
If one of your customers calls or texts you to tell you their system is slow or overheating or gobbling up a lot of power, you need to add a new possible diagnosis to your checklist — cryptojacking. Cryptojacking is...
Brad Stoller: When to drink the Kool-Aid and trust a sales coach
The entrepreneurial spirit that drives many business owners imbues them with key advantages. Entrepreneurs are resilient. They are creative. They are willing to separate from the herd and take the path less traveled. This nonconformist mentality is an advantage in...
Managed wireless charging is coming soon to a table near you
The days when end users spent some portion of their day trying to find an outlet to power a mobile device are coming to an end. Wireless charging that enables the newest generation of mobile devices to be charged inductively...