Tech Time Warp
Tech Time Warp: 25 years of exploiting poor Pikachu

Tech Time Warp: 25 years of exploiting poor Pikachu

One of the first pieces of malware designed to target children turns 25 this month. Take a look back in this edition of Tech Time Warp. First detected in June 2000, the Pikachu Pokémon or “Pokey” virus played on a...

/ June 27, 2025
Navigating the landscape: KPMG reveals the key insights for MSPs

Navigating the landscape: KPMG reveals the key insights for MSPs

A new KPMG report highlights key insights into the evolution of the MSP landscape. There were key seven emerging trends and five universal challenges that are reshaping the industry. Emerging priorities for modern MSPs As the IT landscape continues to...

/ June 26, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Global Microsoft Exchange attack

Cybersecurity Threat Advisory: Global Microsoft Exchange attack

A recent cyber campaign has compromised over 70 Microsoft Exchange servers across 26 countries by injecting JavaScript-based keyloggers into Outlook Web Access (OWA) login pages. Review the details of this Cybersecurity Threat Advisory to safeguard against these vulnerabilities. What is...

/ June 25, 2025
Threat Spotlight: Half the spam in your inbox is generated by AI

Threat Spotlight: Half the spam in your inbox is generated by AI

Cyber attackers are leveraging the power of artificial intelligence (AI) to boost their chances of success in email-based attacks. AI tools can help them to develop and launch more attacks, more frequently, and to make these attacks more evasive, convincing,...

/ June 23, 2025 / 6 Comments

Sales & Marketing

cold outreach
How MSPs can fuel faster growth with AI + cold outreach

How MSPs can fuel faster growth with AI + cold outreach

Dave leads a B2B services firm with a dedicated sales team of three. Over the past year, they’ve invested time and resources into cold outreach, hiring sales reps, and launching marketing campaigns. Despite these efforts, the results have been underwhelming,...

/ June 11, 2025
We’re celebrating Global MSP Day 2025!

We’re celebrating Global MSP Day 2025!

We’re thrilled to announce that we’ll be joining the celebration for Global MSP Day 2025, hosted by Barracuda, on Thursday, June 5th. It’s always a special moment in our calendar – a day that brings together the managed services community across...

/ May 23, 2025
Ask an MSP Expert
Ask an MSP Expert: The 2025 technology outlook from GTIA

Ask an MSP Expert: The 2025 technology outlook from GTIA

The year kicked off with considerable uncertainty driven by macroeconomic factors such as tariffs and inflation. Nevertheless, managed service providers (MSPs) maintain a positive outlook on the tech industry’s trajectory. A recent report from GTIA sheds light on crucial insights...

/ May 22, 2025
Read more Sales & Marketing posts »

Security

AWS MSSPs
AWS sets higher standard for MSSP partners

AWS sets higher standard for MSSP partners

Amazon Web Services (AWS) is raising the bar for managed security services providers (MSSPs) by adding a range of specialized certification requirements. An update to the AWS MSSP Competency program introduces specific categories, including infrastructure security, workload security, application security,...

/ July 3, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zero-day Chrome vulnerability

Cybersecurity Threat Advisory: Zero-day Chrome vulnerability

Google has patched a high-severity zero-day vulnerability, tracked as CVE-2025-6554 with a CVSS score of 8.1, in Chrome’s V8 engine that allows attackers to execute arbitrary code via a crafted HTML page. Review the details of this Cybersecurity Threat Advisory...

/ July 2, 2025
MSPs
MSPs: Unmask 2025’s stealthiest email threats and fortify client defenses

MSPs: Unmask 2025’s stealthiest email threats and fortify client defenses

Managed Services Providers (MSPs) stand on the front lines of cybersecurity, and with email-based attacks continuing to surge in volume and sophistication, your role in protecting clients has never been more critical. Email remains the primary conduit for most cyber...

/ July 1, 2025
Read more Security posts »

Better Business

AI
Should you be worried about copyr(AI)ght?

Should you be worried about copyr(AI)ght?

In previous articles, I’ve covered much of the good and evil around artificial intelligence (AI). An area that I haven’t covered is the impact of copyright on the use of AI. UK and EU tackle AI copyright In the UK,...

/ July 2, 2025
Building client trust: Strategies to prove security and compliance

Building client trust: Strategies to prove security and compliance

Client trust is one of the most valuable assets a managed service provider (MSP) can earn. As clients become more informed about cybersecurity and more cautious in choosing their providers, it’s no longer enough to say you’re secured – you...

/ June 25, 2025
AI
Driving change: The role of AI agents in the channel ecosystem

Driving change: The role of AI agents in the channel ecosystem

A report published by the Futurum Group finds that artificial intelligence (AI) tools, applications, agents, and bots are being increasingly used to automate a range of tasks and processes across the channel, particularly in sales, finance, and partner management. AI...

/ June 19, 2025
Read more Better Business posts »

Tech Insight

Tech Time Warp
Tech Time Warp: A eulogy for the Blue Screen of Death

Tech Time Warp: A eulogy for the Blue Screen of Death

The news that Microsoft will soon retire the infamous “Blue Screen of Death,” aka BSOD, in favor of an all-black “simplified UI for unexpected restarts” has inspired a wave of nostalgia for the screen every Windows user has learned to...

/ July 4, 2025
Tech Time Warp
Tech Time Warp: The secrets to the Apple II’s success

Tech Time Warp: The secrets to the Apple II’s success

The Apple II, designed by Steve Wozniak in 1977, was a groundbreaking self-contained machine, with screen, keyboard, power supply, and electronics all in a single plastic unit. The first Apple IIs were shipped on June 10, 1977, and cost $1,298....

/ June 20, 2025
Pioneers in tech
Pioneers in Tech: The chance to own the image of a visionary

Pioneers in Tech: The chance to own the image of a visionary

If you have a couple of hundred thousand dollars to spare, you currently have the opportunity to purchase the only known photographs of the world’s first computer programming visionary, Ada Lovelace. Discover her legacy in this edition of Pioneers in...

/ June 13, 2025
Read more Tech Insight posts »