Change layout
Working Remotely COVID-19 Raises the Standard for VPN Security

Working Remotely: COVID-19 Raises the Standard for VPN Security

Working Remotely: COVID-19 Raises the Standard for VPN Security

There’s nothing new or especially significant about the remote work concept. Students and employees have been doing it in increasing numbers over the past decade. What changed the game was the recent immediate mass exodus from workplaces and classrooms to home offices or even the living room table as a result of the COVID-19 pandemic.  Continue reading

MSP Process Audit

MSP Process Audit During the Pandemic

MSP Process Audit During the Pandemic

Today, most workloads are remote and most users are trained and understand what they are doing. Hence, there are far fewer tickets from clients. That means that managed IT professionals have a bit more free time than they are used to having. That is the ideal moment to review internal processes and documentation. It might turn out that some of them need fine-tuning or a complete overhaul.

Continue reading

Don’t miss new articles!
Thank you for subscribing!
News You Might've Missed

News You Might’ve Missed. 24 April-1 May

News You Might’ve Missed. 24 April-1 May

This week Microsoft enhances Kubernetes features and Red Hat integrations; Amazon launches Keyspaces for Apache Cassandra; a PAAY LLC database exposes 2.5 million credit card transactions online; Microsoft patches a security flaw in Microsoft Teams; and a hacker group is targeting businesses on the Revive ad-server platform. Let's see what's going on.

Continue reading

Cybersecurity article header

Takeaways From 2019 Ransomware Attacks on MSPs

Takeaways From 2019 Ransomware Attacks on MSPs

If you are an MSP or use the services of one, you should be aware that the level of cyberthreat for MSPs has increased dramatically over the last year.

As we’ve previously pointed out, the range of threat vectors faced by the average MSP is now huge, from social engineering attacks to cryptojacking, alongside the ever-present threat of phishing. Continue reading

Don’t miss new articles!
Thank you for subscribing!
Top 10 PowerShell Commands

Top 10 PowerShell Commands Every IT Admin Should Know

Top 10 PowerShell Commands Every IT Admin Should Know

PowerShell needs no introduction — it’s the configuration management and task automation framework of choice for the Windows environment. It combines the flexibility of a powerful scripting language with the power and speed of the command line to help IT admins orchestrate, automate and troubleshoot common IT functions. Continue reading

News You Might've Missed

News You Might’ve Missed. 13-17 April

News You Might’ve Missed. 13-17 April

What's new this week in the news for MSPs? This week Amazon gave the Outposts hybrid cloud service to GovCloud; the U.S. Defense Department's internal watchdog says there was no interference in Jedi bidding; log-in credentials were stolen in a San Francisco International Airport hack; webhooks are a vulnerability in Slack; and a Ragnar ransomware attack against energy giant EDP. Let's see what's going on.

Continue reading

The MSP’s Guide To Vetting Cybersecurity Vendors

The MSP’s Guide To Vetting Cybersecurity Vendors

The MSP’s Guide To Vetting Cybersecurity Vendors

As the cybersecurity market grows, it has become increasingly difficult for managed service providers to assess the value of third-party vendors. Typically, MSPs must now assess hundreds of different products, even within a fair niche product category, and each with different features and price points. In this article, we’ll take a look at a basic set of practices for assessing different cybersecurity vendors for MSPs, and show you how to get the most out of your interactions with them. Continue reading

Load more