Blog

February 11, 2022

Incident Response Planning: A Checklist for Building Your Cyber Security Incident Response Plan

Elizabeth Fichtner

Is your organization prepared to respond to a security breach or cyber attack? According to many security experts, it’s a matter of “when” and not “if” your company will experience a serious cybersecurity incident.

Read Now
February 10, 2022

Ensuring Profitability in Cybersecurity: Tips from MSPs for MSPs

Rotem Shemesh

Cybersecurity is a lucrative business. The growing risk of being hit by a cyber attack makes it a no brainer for organizations of all sizes to adopt cybersecurity solutions.

Read Now
February 09, 2022

Cobalt Strike: The New Favorite Among Thieves

Chris Gerritz

Since 2012, Cobalt Strike has been utilized as a proactive way of testing network defenses against advanced threat actor tools, tactics, and procedures (TTPs).

Read Now
February 08, 2022

Best Practices for Preventing, Detecting, and Responding to Cyber Attacks

Elizabeth Fichtner

Preventing cyber attacks is a top security concern for most organizations in 2021, and with good reason.

Read Now
February 04, 2022

Cyberside Chat: The History and Evolution of Ransomware

Ryan Weeks

CISO Ryan Weeks sits down with Director of Security Solutions Chris McKie for a fireside-style chat to talk all things ransomware.

Read Now
February 03, 2022

Agent-Based Backup or Agentless Backup: Which Backup Agent is Right for You?

David Weiss

Agent-based backup or agentless backup? It’s an important decision for managed service providers (MSPs) to weigh, and determine which is the best fit for your clients.

Read Now
February 02, 2022

How to Improve Business Efficiency and Service Delivery With an integrated PSA RMM platform

Ona Blanchette

An Integrated professional services automation (PSA) and remote monitoring and management (RMM) that helps MSP run their business efficiently and successfully.

Read Now
February 01, 2022

Expanding your Business into Cybersecurity: Tips for Success from MSPs

Rotem Shemesh

Expanding into cybersecurity can dramatically increase your revenue, but if not done carefully, it could also increase your expenses significantly or damage your reputation.

Read Now
January 31, 2022

Common Types of Cyber Attacks

Elizabeth Fichtner

The complexity and variety of cyber attacks is ever increasing. Here we look at 10 of the most common types of cybersecurity attacks.

Read Now