dcsimg

New to Parallels Desktop? Coherence and other view modes reviewed.

This post is part of a series to assist new users of Parallels Desktop.  While there are many experienced Parallels Desktop users, there are just as many new users. This blog post will give some tips to help the newer users get the most out of Parallels Desktop by using the view mode that will best fit their needs.  First, some framework. Running two (or more) operating systems at … [Read more...]

Could Your MSP Be Growing More Quickly? 

The investment space is on fire for managed services businesses. From mergers and acquisitions to venture capital, profitable MSPs are making major headlines around their financial activity. The managed services model is attractive for external investment because of the power of its rich recurring revenue stream. Today’s steady revenues can serve as a predictor of potential future revenues … [Read more...]

Fostering Digital Transformation One Nomad at a Time: How Both Organizations and Employees Benefit from Remote Work Strategies

Digital Nomad, a term coined twenty years ago by Hitachi executive Tsugio Makimoto in his book by the same name, predicted that technology combined with our natural urge to travel would let people live, work, and exist on the go rather than being tied to an office desk or physical work location. Today, 4.8 million … The post Fostering Digital Transformation One Nomad at a Time: How Both … [Read more...]

Is domain name abuse something companies should worry about?

Even though some organizations and companies may not realize it, their domain name is an important asset. Their web presence can even make or break companies. Therefor, “domain name abuse” is something that can ruin your reputation. Losing control There are several ways in which perpetrators can abuse your good name to make a profit for themselves, while ruining your good name in … [Read more...]

Podcast: Managing a Corporate Merger and Acquisition (M&A)

In the podcast show Defrag This, host Greg Mooney interviews Chris Hickman on how IT should approach mergers and acquisitions (M&As). … [Read more...]

US Cybersecurity Agency CISA Alert: Foreign Threat Actors Continue to Target Unpatched Vulnerabilities

CISA warns that foreign threat actors from China and Iran are routinely targeting unpatched vulnerabilities across government agencies and U.S.-based networks. Background On September 14 and September 15, the Cybersecurity Infrastructure Security Agency (CISA) published two separate alerts detailing malicious activity from foreign threat actors: AA20-258A: Chinese Ministry of State … [Read more...]

Charities and the advertising industry: data ecosystems and privacy risks

Data makes the world go round, more often than not via advertising and its tracking mechanisms. Whether you think making money from large volumes of PII to keep the web ticking over is a good thing, or a sleazy data-grab often encouraging terrible ad practices, it’s not going to go away anytime soon. A detailed analysis of ad tracking mechanisms on popular charity websites has been released by … [Read more...]

Managing Identities and Passwords in Azure Active Directory

In the hybrid cloud world we live in today, using Identity Protection (IdP) and Privileged Identity Management (PIM) can help you lower your security risks. Read the post here: Managing Identities and Passwords in Azure Active Directory … [Read more...]

Backup Monitoring: Part 6—Securing Your Backup Devices

In prior posts, as well as during my monthly office hours and quarterly boot camp sessions, I have touched on a number of security topics as they relate to SolarWinds® Backup. This always seems to draw a lot of questions, so I felt it appropriate to expand on those topics a bit more in a dedicated blog post, and provide some additional guidance and resources for those who want more … [Read more...]

Partnering for Growth: Strong Defenses, Solid MSP Partnerships

Protecting your customers from cyberthreats requires strong layered security defenses. One of the layers many MSPs neglect is https://www.solarwindsmsp.com/products/mail-assure/use-cases/email-filt… filtering technology, despite email being the most common attack vector used by cybercriminals. Read More … [Read more...]