Change layout
News You Might've Missed

News You Might’ve Missed. April 2022

News You Might’ve Missed. April 2022

What's new this month in the news for MSPs? Microsoft previews its first ARM-based Azure Virtual Machines; Spring Cloud Function could be the next Log4Shell vuln; Microsoft Exchange servers the target of Hive ransomware affiliate; files are destroyed by Onyx ransomware, not encrypted; and Emotet malware leveraging Windows PowerShell shortcuts for installation. Continue reading

News You Might've Missed

News You Might’ve Missed. March 2022

News You Might’ve Missed. March 2022

What's new this month in the news for MSPs? VMware and Google Cloud announce partnership expansion to focus on cloud migration; AWS says it’s investing over $2.3bn in data centers in the UK; Linux “Dirty Pipe” vulnerability allows attackers to gains data overwrite access; Microsoft confirms Lapsus$ hacking; Hive ransomware hides payload using “IPfuscation” trick; and Suncrypt is still busy and humming in 2022. Continue reading

Don’t miss new articles!
Thank you for subscribing!
News You Might've Missed

News You Might’ve Missed. January 2022

News You Might’ve Missed. January 2022

What's new this month in the news for MSPs? Flexible instances for high-performance computing workloads launched by Amazon; 12-year-old vulnerability in a Linux system tool gives hackers root privileges; new warning to NAS users from QNAP on DeadBolt ransomware; prepare for data-wiping cyberattacks says CISA; and more. Continue reading

Don’t miss new articles!
Thank you for subscribing!
5 Largest Ransomware Attacks of 2021 Explained

The Five Largest Ransomware Attacks of 2021 Explained

The Five Largest Ransomware Attacks of 2021 Explained

2021 was a banner year for ransomware, which is a type of malicious software that encrypts files, disrupts the operations of companies, and asks for a ransom in exchange for the release of the data. Attacks have devastated companies of all shapes and sizes, and crippled hospitals, fuel pipelines, food supply organizations and more. Continue reading

VPN Management Best Practices

Guide to Vendor Off-boarding: Checklist Included

Guide to Vendor Off-boarding: Checklist Included

There are several reasons why you may need to change your current solutions vendor or discontinue your contract.

First of all, you may have found a solution that fits your needs better, either because of the technological shift your company is experiencing, or because you have found a solution that has outgrown its competition and you think it's worth switching. Continue reading

Comprehensive Guide to Password Security blog header

Comprehensive Guide to Password Security

Comprehensive Guide to Password Security

More than half of all data breaches happen because of weak passwords.

Bad passwords are a headache for any system administrator whose users are allowed to modify or change them. At the same time, weak password management is a pain for the company as a whole, since malefactors are on a constant lookout for weaknesses they can breach. Continue reading

Load more