Cybersecurity Blog
- BlogMSPs: Building your service stack for 6x revenue multiplierPart 3 of our 3-part blog series: Service Architecture and the Path to Expert StatusPartners
- Blog10 questions that drive higher MSP revenue multipliersPart 2 of our 3-part blog series: Understanding the Revenue Multiplier GapPartners
- BlogAnnual report: Nastiest Malware 2025Cybercriminals aren’t slowing down, and neither is their malware. In 2025, the nastiest threats are smarter, faster, and more destructive than ever, putting SMBs and MSPs directly in the crosshairs.Cyberthreats
- BlogHack the hacker: How LockBit's ransomware empire crumbledIn 2024, law enforcement took down one of the cyber world's most ruthlessly efficient ransomware groups: Lockbit.CyberthreatsData ProtectionData Security
- BlogScattered Spider: How law enforcement turned the tablesRemembering the notorious Scattered Spider cybercrime group, whose social engineering scams caused millions of dollars in damages to some of the world's biggest brands.Cyberthreats
- BlogMaking sense of Microsoft’s partner changes: A guide for MSPsMicrosoft is changing its Direct Bill rules. But there is a way forward.Microsoft
- BlogProtect clients, grow services: Unified endpoint security for MSPsOpenText endpoint security gives MSPs an edge against cyber attackers by providing advanced detection and response through one lightweight agent.CyberthreatsData ProtectionData SecurityPartners
- BlogWhat Is social engineering?When attackers target human behavior to compromise cyber security, the tactic is known as social engineering.Cybersecurity GlossaryCyberthreatsEmail SecurityMDR/EDR
- BlogWindows 10 end of life: Backup strategies for SMBsWith Microsoft ending support for Windows 10, many organizations will need a robust backup strategy to safeguard endpoints, cloud data and legacy hardware.Data ProtectionData SecurityMicrosoft








