Results for: tech time warp

Tip Tuesday: Minimize shadow IT risks through communication
Although shadow IT (any IT resource used by employees or end users without the IT department’s approval or oversight) practices come with a laundry list of risks, people often insist on using them. In this edition of Tip Tuesday, we’ll...

Tip Tuesday: How to integrate full-service cybersecurity
October is National Cybersecurity Awareness Month in the United States. That makes it a fantastic time to strongly consider offering full-service cybersecurity as part of your managed service provider (MSP) stack. That decision can boost your revenue and show clients...

From Basics to Breakthroughs: Evolution of IT security in the 1980s
As part of our 5-part series on the evolution of cybersecurity, check out our first article below that covers how War Games and Worms led to the creation of the first cybersecurity efforts in the 1980s. While cybersecurity is a multibillion-dollar...

Tip Tuesday: Lead generation for MSP marketing
This month’s Tip Tuesday dives into how many managed service provider (MSP) businesses need help attracting leads. Instead, they tailor their marketing strategy to focus on something else. While this might help companies in the beginning phases and even attract...

Cybersecurity Threat Advisory: OneNote malware delivery
Multiple threat actors are now using OneNote documents to deliver malware. In the last month alone, over 50 OneNote campaigns delivering different malware payloads through email attachments have been observed.

The Creeper and the Reaper make cybersecurity history
“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

Java cloud migration starting to accelerate
Managed service providers can gain insight into the rate at which production applications are moving into the cloud from a survey of 1,800 developers published today by The Eclipse Foundation. The survey finds that half the respondents are running less...

The never-ending battle against ransomware
Ransomware has largely faded from the headlines since WannaCry and NotPetya wreaked havoc across the globe in 2017. In some ways, ransomware creators were victims of their own success. The attacks garnered so much attention that, as Malwarebytes’ Chris Boyd told...

Threat Watch: Resume Files containing Advanced Persistent Threats
As cybercriminals become more duplicitous by the day, businesses and individuals alike need to be more aware than ever of their digital surroundings. One example of this was recently highlighted on the Barracuda blog: Resume files containing Advanced Persistent Threats...