Side by side once more, Erick and Rich discuss Ingram Micro’s new “digital twin,” how and why to get MDF, and a brilliant invention from Johns Hopkins University that prevents burritos from unrolling.
While partners at this week’s TD SYNNEX conference discuss booming IT market conditions, Erick and Rich discuss how to prepare for the inevitable slowdown to come, along with recent evidence that artificial intelligence isn’t all that intelligent yet.
With each issue packed full of powerful news, reviews, analysis, and advice targeting IT channel professionals, ChannelPro-SMB will help you cultivate your SMB customers and run your business more profitably.
New findings from Kaspersky reveals that, in six in ten (63%) cyberattacks investigated by the Kaspersky Global Emergency Response team, adversaries used password brute force and vulnerability exploitation as initial vectors to compromise the organization’s environment.
- read more
Ransomware has been a major threat to businesses and individuals for years now. Preventing these threats and dealing with them if they arise requires the right strategy. Get the infographic to discover key stats about the state of ransomware, the potential consequences of a ransomware infection, and a list of the key tools to help you prevent and deal with ransomware.
- read more
Cybersecurity. It’s delicious, nutritious, and a big part of this week’s episode, in which Matt, Rich, and guest host Luis Alvarez discuss the security-heavy news from...
- read more
Pulseway Patch is designed to serve as an affordable, easy-to-use option for MSPs and IT departments that either don’t have an RMM solution or don’t like the patching tool their RMM solution provides.
- read more
New functionality introduced today lets users apply patches to specialized and custom-coded solutions not on the growing list of products already supported by Pulseway’s patch management system.
- read more
The new tool provides a centralized service that businesses and MSPs can use to identify critical patches, prioritize their deployment, and monitor the outcome to maintain security integrity.
- read more