Tip Tuesday
Tip Tuesday: How to conduct a post-incident review and why it matters

Tip Tuesday: How to conduct a post-incident review and why it matters

Managed service providers (MSPs) know that security incidents are inevitable. They could be a phishing attack, a misconfiguration, or a system outage. Regardless of how one occurs, what truly matters is how you respond to and learn from these events....

/ March 18, 2025
Email Threat Radar – March 2025

Email Threat Radar – March 2025

Over the last month, Barracuda threat analysts identified several notable email-based threats targeting organizations around the world, including: Extortion attempts impersonating Clop ransomware New attacks by the evasive and highly adaptive LogoKit phishing platform A phishing campaign leveraging SVG image file attachments Attackers...

/ March 17, 2025 / 7 Comments
Pioneers in Tech
Pioneers in Tech: Margaret Hamilton sends man to the moon

Pioneers in Tech: Margaret Hamilton sends man to the moon

The photo is iconic: A young woman stands next to almost 20 bound books, the stack of books nearly as tall as her (though she appears to have a slight heel in the shoes complementing her very 1960s shift dress)....

/ March 14, 2025
Cybersecurity Skills Gap
Closing the cybersecurity skills gap: How MSPs can rescue businesses

Closing the cybersecurity skills gap: How MSPs can rescue businesses

Cybersecurity threats are growing in frequency and sophistication, and organizations industrywide are grappling with a critical shortage of skilled cybersecurity professionals to defend against them. A World Economic Forum report reveals that the cybersecurity skills gap widened by 8 percent last...

/ March 12, 2025

Sales & Marketing

Ask an MSP Expert
Ask an MSP Expert: How to generate authentic AI prospecting content

Ask an MSP Expert: How to generate authentic AI prospecting content

The rise of artificial intelligence (AI) has created challenges for businesses striving to find the right balance between operational efficiency and preserving a personal touch in their communications. Kendra Lee, founder of the KLA Group and a recognized expert in...

/ April 3, 2025
MSP plan
Your flight plan for MSP Success: Knowing your audience and value proposition

Your flight plan for MSP Success: Knowing your audience and value proposition

For managed service providers (MSPs) striving to grow and stand out in a competitive market, a clear and actionable marketing strategy is essential. Much like preparing for a successful flight, knowing your audience and defining your unique value proposition are...

/ March 6, 2025
PRO MSP
What does it mean to be a PRO MSP?

What does it mean to be a PRO MSP?

At my managed service provider (MSP) marketing agency, Tech Pro Marketing, the word PRO is in our name, but in recent years, it’s also become somewhat of a mantra. To me, it’s all about results and relationships. Results are everything...

/ February 5, 2025
Read more Sales & Marketing posts »

Security

The SOC case files
The SOC case files: RansomHub exploits FortiGate bug in attack blocked by XDR

The SOC case files: RansomHub exploits FortiGate bug in attack blocked by XDR

Barracuda’s Managed XDR team recently contained a determined and complex attack by a ransomware gang. The attackers had been trying to find a way into a manufacturing company’s network since December 2024 and finally succeeded by exploiting an exposed firewall...

/ April 2, 2025
cybersecurity risks
Staying Ahead cybersecurity risks stemming from global events

Staying Ahead cybersecurity risks stemming from global events

News events can often serve as a gateway for hackers. Disasters or wars provide cybercriminals with immediate opportunities for phishing attacks, while political unrest opens doors for exploitation and financial gain. Even seemingly positive news can pose cybersecurity risks. For...

/ April 1, 2025
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Microsoft zero-day vulnerability

Cybersecurity Threat Advisory: Microsoft zero-day vulnerability

Microsoft disclosed a vulnerability, CVE-2025-26633, affecting the Microsoft Management Console (MMC). A known threat actor called EncryptHub is exploiting it. Read this Cybersecurity Threat Advisory to learn how to mitigate your risks from this zero-day vulnerability. What is the threat?...

/ March 28, 2025
Read more Security posts »

Better Business

data center
Navigating the data center capacity challenge for MSPs

Navigating the data center capacity challenge for MSPs

A report published by JLL, a provider of commercial real estate and investment management services, reveals that co-location vacancy rates in commercial data center decreased to a record low of 2.6 percent in 2024. At the same time, consumption of...

/ April 3, 2025
partner program
Celebrating Barracuda’s 5-star partner program

Celebrating Barracuda’s 5-star partner program

For the 13th consecutive year,  the Barracuda Partner Success Program has earned a 5-Star Award in the CRN Partner Program Guide. This honor recognizes vendors that deliver the channel’s top partner programs, and it demonstrates Barracuda’s commitment to providing unmatched support and resources to...

/ March 31, 2025 / 9 Comments
MSPs cloud
Survey: MSPs taking on larger cloud role

Survey: MSPs taking on larger cloud role

A global survey of over 750 technical professionals and executive leaders finds that 60 percent are using managed service providers (MSPs) to handle some (29 percent) or more of their public cloud management, and 18 percent report they expect to...

/ March 27, 2025
Read more Better Business posts »

Tech Insight

Tech Time Warp
Tech Time Warp: How Hewlett-Packard shook up multiple industries and the modern workplace

Tech Time Warp: How Hewlett-Packard shook up multiple industries and the modern workplace

Technology innovations typically arise from humble locations, not glassy high-rises. Michael Dell started his company from a dorm room in 1984. Steve Jobs and Steve Wozniak built the Apple I in a garage in the mid-1970s. Another name we all...

/ March 28, 2025
Tech Time Warp
Tech Time Warp: The 10-day takeover of a botnet

Tech Time Warp: The 10-day takeover of a botnet

In 2009, researchers from the University of California, Santa Barbara, outsmarted the cybercriminals behind the notorious Torpig botnet. They uncovered critical knowledge about how this type of malware works. Learn how in this edition of Tech Time Warp. Researchers first...

/ March 21, 2025
Tech Time Warp: The great Michelangelo scare

Tech Time Warp: The great Michelangelo scare

Thirty years ago, PC users worldwide were left saying “Huh?” after the much-hyped Michelangelo virus turned out to be, well, not much. Learn what the virus’ enduring legacy might say more about the media than about a security risk in...

/ March 7, 2025
Read more Tech Insight posts »