Increased open source software reliance creates MSP opportunities
A survey of 712 IT professionals suggests that as organizations rely more on open source software, they are struggling with security updates and patches (39 percent), installations, upgrades, and configurations (30 percent), and technical support (29 percent). Nearly half (47...
What does a “right-size” incident response plan look like?
Often, when a cyber incident occurs, the response is ad hoc—a reactive, seat‑of‑the‑pants scramble. After all, every incident is different, so how can you plan for what you don’t know? But just as every building fire is different, there are...
Tip Tuesday: Adding recurring employee qualification tracking to your services
The managed service provider (MSP) landscape is moving toward proactive compliance and employee qualification management. As MSPs, you should add recurring employee qualification tracking to your service offerings to increase revenue and improve your clients’ overall satisfaction. The value of...
Sales & Marketing
If you’re an MSP owner who wants more consistent leads, start here
As someone who’s spent the last 8+ years helping hundreds of MSPs generate leads and book real sales conversations, I hear the same frustration over and over again: “We’re doing some marketing… but leads are inconsistent.” Some months are busy....
How MSPs grow email lists using LinkedIn
Key Takeaways Treat LinkedIn as the top of a list-building strategy, not the destination. Offer practical resources MSP buyers care about to earn email opt-ins. Use a Pillar–Cluster–Dot–FAQ framework to turn one topic into ongoing LinkedIn engagement. Most IT providers...
What is AI search and why should MSPs care?
Key takeaways AI search generates direct answers instead of listing links. MSP visibility now depends on being summarized and cited, not just ranked. AI search builds on SEO but prioritizes clarity, structure, and consistency. MSP leaders who refine positioning and...
Security
Cybersecurity Threat Advisory: Adobe Acrobat Reader zero-day
Reports confirm active exploitation of a previously unknown zero‑day vulnerability in Adobe Acrobat Reader since at least December 2025. Attackers are delivering malicious PDF files via phishing and other social engineering methods to achieve remote code execution when the file...
Cybersecurity Threat Advisory: Ransomware turning off EDR with vulnerable drivers
Qilin and Warlock (also known as “Water Manaul”) ransomware groups are using bring your own vulnerable driver (BYOVD) techniques to disable endpoint security tools on Windows systems. These actors can shut down more than 300 EDR drivers across multiple security...
Cybersecurity Threat Advisory: Storm-1175 exploits zero-days to deploy Medusa ransomware
Storm-1175 is a threat actor using a rapid sequence of zero-day and N-day exploits to deploy Medusa ransomware against internet-facing assets. This high-velocity attack pattern has been highlighted by security researchers, who emphasize the heightened risk posed by exposed perimeter...
Better Business
Beyond recovery: The new resilience mindset
A global survey of 1,000 business and IT decision‑makers and senior developers shows that while organizations feel more resilient than they were a year ago, many still struggle with the cost of recovery and remediation when a real IT incident...
The talent strategy behind the most profitable IT service providers
A global survey of IT services providers finds that the most profitable organizations tend to spend less on payroll by relying more heavily on junior staff to fulfill clearly defined roles. Conducted by Service Leadership, the survey also reveals that the...
Why information security matters more than ever
It’s all in the information. The first recorded patent was issued to Filippo Brunelleschi in Florence in 1421, covering his invention of a barge and crane used to transport marble. Shortly afterward in 1449, John of Utynam was issued a...
Tech Insight
Pioneers in Tech: Frances “Poppy” Northcutt, the first woman in Mission Control
All eyes have been on Artemis 2 this week and its many firsts. These include the first woman to fly to the moon (Christina Koch) and the first female launch director of a crewed launch (Charlie Blackwell-Thompson). That’s why this...
Tech Time Warp: The Conficker case study
Conficker was a nasty piece of malware that first emerged on the scene in November 2008. By April 1, 2009, many security experts and computer users were bracing themselves for the worst: a predicted “menacing” new phase as machines infected...
What soaring cloud demand and supply constraints mean for MSPs
A report from market research firm Omdia finds that global spending on cloud infrastructure continues to accelerate, with spending in the fourth quarter of 2025 reaching $110.9 billion—a 29 percent increase year over year. Cloud providers see strong growth momentum...
