IT and Business Insights for SMB Solution Providers

Blog Entries

September 17th, 2019 | Jay Ferron | My information Resource
Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could allow remote attackers to compromise targeted mobile phones and spy on victims just by sending an SMS.Dubbed "SimJacker," the vulnerability resides in a - Read More
 
September 17th, 2019 | Jay Ferron | My information Resource
    Linux™ operating systems are sometimes overlooked as targets for malware due to the smaller pool of victims compared to more popular operating systems. With the reduced number of targets, the attacker is incentivized to direct their efforts towards a richer hunting ground. - Read More
 
September 17th, 2019 | Jay Ferron | My information Resource
    Keeping track of your child’s whereabouts has never been easier. A quick search on Amazon shows thousands of entries for low-cost GPS trackers designed to be worn by children and linked to an app on the parent’s smartphone. However, the appeal of the low cost comes at - Read More
 
September 13th, 2019 | Karl Palachuk | Small Biz Thoughts
From my good friends at NexGen:NexGen Conference  2019Complimentary General Admission Pass for October 23 & 24thUse Promo Code SmallBizAnaheim, CA - Anaheim Marriottwww.nexgenconference.comManaged services are at the heart of the IT solution provider business, generating a staggering $158 - Read More
 
September 9th, 2019 | Karl Palachuk | Small Biz Thoughts
As some of you may have noticed, I like to travel. A lot.Travel is a great example of why "cost" is a relative thing - and why the cheapest looking price is often not the cheapest at all. Remind your clients and prospects of this when they want to talk about pricing.My apartment in EdinburghHere - Read More
 
September 4th, 2019 | Jay Ferron | My information Resource
    When Turkish researcher Özkan Mustafa Akkuş publicly disclosed a Remote Code Execution (RCE) vulnerability in the Webmin application at DefCon this month, the Webmin developers went into emergency overdrive mode to fix this issue ASAP. While the ethics of Akkuş - Read More
 
September 4th, 2019 | Jay Ferron | My information Resource
    The Syrk ransomware, first reported by researchers at Cyren Security, disguises itself as a cheating device for the multiplayer Hunger Games style video game Fortnite. It proclaims the ability to provide aim assistance as well as player location revealing abilities. It doesn't - Read More
 
September 4th, 2019 | Jay Ferron | My information Resource
Original release date: September 4, 2019The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain vigilant for malicious cyber activity targeting Hurricane Dorian disaster victims and potential donors. Fraudulent emails commonly appear after major natural disasters and often - Read More
 
September 3rd, 2019 | Erick Simpson | Managed Services Blog
The Cybersecurity Sales Professional In a mature Cybersecurity sales model, it is the sales professional’s responsibility to execute each of the 7 steps of the sales process: prospecting, warm-up, qualifying, presenting, overcoming objections, closing and follow-up - Read More
 
September 3rd, 2019 | Karl Palachuk | Small Biz Thoughts
The Unbreakable Rules of PSA – IT Service Delivery in the 21st CenturyTaught By: Manuel PalachukRegister NowFive Tuesdays - 9:00 AM PacificSeptember 10, 2019 - October 8, 2019Course 5w11Everyone needs a PSA - Professional Services Automation tool. But in addition to simply having a PSA, you - Read More
 

Pages