IT and Business Insights for SMB Solution Providers

Blog Entries

February 26th, 2020 | Karl Palachuk | Small Biz Thoughts
A note for new entrepreneurs.Starting a business, or a new adventure? Be honest as you assess yourself and your commitment.Human beings have an optimism bias. If we didn’t, we’d never have children. But most of us are predisposed to believe that good things will happen to us and bad - Read More
 
February 24th, 2020 | Erick Simpson | Managed Services Blog
Thursday, Feb 27th @ 11am PT / 1pm CT / 2pm ET Join me and industry veteran Tom Sopwith from IT Glue for my next MSP Mastered® Webinar. During this service improvement Webinar, we’ll provide an overview of the “Four Ps” of Service Delivery Improvement: People - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
For you security professions this is a great site to get guidance and software. The software listed here developed within the National Security Agency and is available to the public for use. I encourage you to check it out!I would also tell you to check out  this site as well code - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
    The National Security Agency released the source code of Ghidra, its reverse engineering tool.    This source code repository includes instructions to build on all supported platforms (macOS, Linux, and Windows). With this release, developers will be able to - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
 Details of 10.6 million MGM hotel guests posted on a hacking forum Chinese hackers have breached online betting and gambling sitesA DivvyCloud report finds 196 data breaches exposed more than 33 billion records due to environments without appropriate security.Iranian hackers have been - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
    We expect services to protect themselves from fraudulent activity. Automated services tend to be particularly tempting to unscrupulous individuals that seem to think that they can pull one over on an unmanned operation. So it makes plenty of sense for Google AdSense to be - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
    Many people believe that cybersecurity training and awareness isn’t important in their jobs, especially if their role isn’t technical. However, social engineering has led to the human element being the weakest link in the cybersecurity chain and attackers can be very - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
    Emotet banking Trojan has been around since 2014 as banking malware. As the software was changed, the developers added additional spamming and malware delivery services found in otherbanking malware. Key to Emotet is how it incorporates functionality allowing the software to evade - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
    Bluetooth technology seems to be nearly everywhere now. It is an extremely convenient method to make all sorts of different devices speak the same language and perform greater functions. As we already know though, when computing devices can communicate trouble soon follows in one - Read More
 
February 22nd, 2020 | Jay Ferron | My information Resource
    A ransomware variant referred to as Ragnar Locker is specifically targeting servicesused by managed service providers and threatening the public release of found documents. Managed service providers remotely manage a customer's IT infrastructure and end-user systems. With the remote - Read More
 

Pages