This report comprised of statistics pulled from a survey of 1,400+ managed service providers (MSPs), our partners, and clients, around the world to provide unique visibility into the state of ransomware from the perspective of the IT Channel.
Erick and Rich dive into the results of this year's ChannelPro State of the Channel Survey, talk about cultivating the next generation of leaders at your company, and then discuss a new product that tells you what dogs are REALLY thinking when they bark.
Taking a break from the slopes during his ski vacation, Erick talks with Rich about the surprising departure of Renee Bergeron from Ingram Micro, the rewards of saying “no” to customers sometimes instead of “yes,” and the death grip Windows 7 seems to have on the last PCs running it.
With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.
I am a self proclaimed geek who has authored, may technical training courses. As a speaker Jay has presented at many events including, user groups, Computer trade shows, DOD and federal conferences, ISPCON, TechEd, and WPC. Jay is on the global board member of GITCA. Past President of ISACA-CT, Past president APCUG and is a Microsoft MVP Enterprise Security. Jay has been a MVP in in Windows, HPC, and Azure.
For you security professions this is a great site to get guidance and software. The software listed here developed within the National Security Agency and is available to the public for use. I encourage you to check it out!I would also tell you to check out this site as well code - Read More
The National Security Agency released the source code of Ghidra, its reverse engineering tool. This source code repository includes instructions to build on all supported platforms (macOS, Linux, and Windows). With this release, developers will be able to - Read More
Details of 10.6 million MGM hotel guests posted on a hacking forum Chinese hackers have breached online betting and gambling sitesA DivvyCloud report finds 196 data breaches exposed more than 33 billion records due to environments without appropriate security.Iranian hackers have been - Read More
We expect services to protect themselves from fraudulent activity. Automated services tend to be particularly tempting to unscrupulous individuals that seem to think that they can pull one over on an unmanned operation. So it makes plenty of sense for Google AdSense to be - Read More
Many people believe that cybersecurity training and awareness isn’t important in their jobs, especially if their role isn’t technical. However, social engineering has led to the human element being the weakest link in the cybersecurity chain and attackers can be very - Read More
Emotet banking Trojan has been around since 2014 as banking malware. As the software was changed, the developers added additional spamming and malware delivery services found in otherbanking malware. Key to Emotet is how it incorporates functionality allowing the software to evade - Read More
Bluetooth technology seems to be nearly everywhere now. It is an extremely convenient method to make all sorts of different devices speak the same language and perform greater functions. As we already know though, when computing devices can communicate trouble soon follows in one - Read More
A ransomware variant referred to as Ragnar Locker is specifically targeting servicesused by managed service providers and threatening the public release of found documents. Managed service providers remotely manage a customer's IT infrastructure and end-user systems. With the remote - Read More
Modern communication revolves around the internet and the digital age, allowing people to communicate instantaneously no matter where they are in the world. There are many messaging applications that have come along through the years, but one of the most popular ones used today is - Read More
Take a look around and note all of the electronics around you. How many devicesare in the room with you? How many are communicating? Look beyond theobvious computer, cell phone, and smart watch. Are there headphones? Keyfobs? Door locks? Anything with a circuit board can be hacked and - Read More